There's also the AllowHosts and DenyHosts directives. Not as slick as tcp
wrappers, but it saves ya a recompile.
--
Gregor Mosheh
[EMAIL PROTECTED]
On-Site Systems Admin, Humboldt Internet
707.825.4638
On Thu, 14 Oct 1999, Anthony T Moran wrote:
>
>
> You said:
>
> >
> > Hello,
> >
> > Do you kmown if there is a way to limite the access to a machine? There is
> > a way to configure which users can access a machine using ssh?
> >
> > Thanks in advance,
>
> Hi.
>
> Best way to do this is to use TCP Wrappers.
> ftp://ftp.porcupine.org/pub/security/index.html
>
> Unfortunately, you need to afair, need to compile this into ssh (?)
> See the FAQ's etc.
>
> In any case though, if you have felt it necessary to use ssh in the first
> place, then you definitely should use TCP Wrappers to limit and
> monitor access to services on your machine/s as well. Good thing about
> using ssh with TCP Wrappers is that it provides some basic logging of
> incoming ssh usage on your machine, unless you are using the commercial
> version of ssh which does that for you.
>
> Have fun, Tony
>
>
>
>
>
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> "He who will not reason is a bigot; he who cannot is a fool;
> and he who dares not is a slave." - Sir William Drummond
>
> We don't inherit the Earth from our ancestors, we borrow it from our kids
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
>
>
>
>