Date: Sun, 26 Sep 2004 00:20:05 +0200 From: des@des.no (=?iso-8859-1?q?Dag-Erling_Sm=F8rgrav?=) To: Peter Jeremy <PeterJeremy@optushome.com.au> Cc: freebsd-security@freebsd.org Subject: Re: sshd security Message-ID: <xzpwtyirnxm.fsf@dwp.des.no> In-Reply-To: <20040925203833.GG83620@cirb503493.alcatel.com.au> (Peter Jeremy's message of "Sun, 26 Sep 2004 06:38:33 %2B1000") References: <6.0.0.22.2.20040924082209.01f44ae0@mail.computinginnovations.com> <20040925203833.GG83620@cirb503493.alcatel.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
Peter Jeremy <PeterJeremy@optushome.com.au> writes: > Depending on how TCP wrappers are integrated into SSH, one possibility > is that you need /var/empty/etc/hosts.{allow,deny} no, hosts_access() is called before chroot(). DES --=20 Dag-Erling Sm=F8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzpwtyirnxm.fsf>