There's also the AllowHosts and DenyHosts directives. Not as slick as tcp
wrappers, but it saves ya a recompile.

--
Gregor Mosheh
[EMAIL PROTECTED]
On-Site Systems Admin, Humboldt Internet
707.825.4638


On Thu, 14 Oct 1999, Anthony T Moran wrote:

> 
> 
> You said:
> 
> > 
> > Hello,
> > 
> > Do you kmown if there is a way to limite the access to a machine? There is
> > a way to configure which users can access a machine using ssh? 
> > 
> > Thanks in advance,
> 
> Hi.
> 
> Best way to do this is to use TCP Wrappers.  
> ftp://ftp.porcupine.org/pub/security/index.html
> 
> Unfortunately, you need to afair, need to compile this into ssh (?)
> See the FAQ's etc.  
> 
> In any case though, if you have felt it necessary to use ssh in the first
> place, then you definitely should use TCP Wrappers to limit and
> monitor access to services on your machine/s as well.  Good thing about
> using ssh with TCP Wrappers is that it provides some basic logging of
> incoming ssh usage on your machine, unless you are using the commercial
> version of ssh which does that for you.
> 
> Have fun,  Tony
> 
> 
> 
> 
> 
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
>      "He who will not reason is a bigot; he who cannot is a fool; 
>       and he who dares not is a slave."    - Sir William Drummond
> 
> We don't inherit the Earth from our ancestors, we borrow it from our kids
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> 
> 
> 
> 

Reply via email to