Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Sep 2004 06:38:33 +1000
From:      Peter Jeremy <PeterJeremy@optushome.com.au>
To:        Derek Ragona <derek@computinginnovations.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: sshd security
Message-ID:  <20040925203833.GG83620@cirb503493.alcatel.com.au>
In-Reply-To: <6.0.0.22.2.20040924082209.01f44ae0@mail.computinginnovations.com>
References:  <6.0.0.22.2.20040924082209.01f44ae0@mail.computinginnovations.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 2004-Sep-24 08:22:12 -0500, Derek Ragona wrote:
>I tried to implement a similar scheme in my hosts.allow on a FreeBSD 5.2.1 
>server.  But when I try to test it from an IP outside my LAN, it still 
>allows ssh logins.  I even put in a line in hosts.allow to explicitly deny 
>the IP I was ssh'ing from, but it still let me in.  The behavior  gives the 
>appearance that TCP wrappers are not enabled, and thus the /etc/hosts.allow 
>file is ignored.
>
>Is there something I need to do to enable the wrappers in sshd?  I saw that 
>there is a compile option for the portable source from openssh.org, so I 
>wonder if there is some compile option that needs to be enabled in 
>make.conf?

Depending on how TCP wrappers are integrated into SSH, one possibility
is that you need /var/empty/etc/hosts.{allow,deny}

-- 
Peter Jeremy



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040925203833.GG83620>