[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-users] SSH EXPLOIT IN THE WILD
- Subject: RE: [cobalt-users] SSH EXPLOIT IN THE WILD
- From: "agility" <webmgr@xxxxxxxxxxxxxxxxxx>
- Date: Tue Sep 16 13:38:01 2003
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
> > how did you limit ssh connections again from hosts.deny and or
> hosts.allow
> > ???
> >
> > Any thougths about it in general ??
>
> Robbert
>
> We do this:
>
> Hosts.allow >>
> #
> # hosts.allow This file describes the names of the hosts which are
> # allowed to use the local INET services, as decided
> # by the '/usr/sbin/tcpd' server.
> #
> SSHD: 123.123.123.123
> in.telnetd: 123.123.123.123
>
> On the hosts.deny >>
>
> #
> # hosts.deny This file describes the names of the hosts which are
> # *not* allowed to use the local INET services, as decided
> # by the '/usr/sbin/tcpd' server.
> #
> SSHD: ALL
> in.telnetd: ALL
dumb question, but do you have to restart (how) sshd after modding the
hosts.deny/allow files?
Or are they read each time a connection is attempted?