From owner-freebsd-security Wed Mar 28 8:16:26 2001 Delivered-To: freebsd-security@freebsd.org Received: from moek.pir.net (moek.pir.net [130.64.1.215]) by hub.freebsd.org (Postfix) with ESMTP id B70FA37B72B for ; Wed, 28 Mar 2001 08:16:23 -0800 (PST) (envelope-from pir@pir.net) Received: from pir by moek.pir.net with local (Exim) id 14iIcM-0003PR-00 for security@freebsd.org; Wed, 28 Mar 2001 11:16:18 -0500 Date: Wed, 28 Mar 2001 11:16:18 -0500 From: Peter Radcliffe To: security@freebsd.org Subject: Re: account control to ssh Message-ID: <20010328111618.C9865@pir.net> Reply-To: security@freebsd.org Mail-Followup-To: security@freebsd.org References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from George.Giles@mcmail.vanderbilt.edu on Wed, Mar 28, 2001 at 09:52:06AM -0600 X-fish: < X-Copy-On-Listmail: Please do NOT Cc: me on list mail. Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org George.Giles@mcmail.vanderbilt.edu probably said: > How would I restrict incoming ssh connections on a per user basis ? Either with a pam module or the sshd config options Allow/DenyUsers/Groups. With openssh 2.5.0 or later you can use 'DenyGroups nossh' create a 'nossh' group and put users who should not be allowed to ssh in in that group. Pre-2.5.0 the group in DenyGroups has to be their primary group listed in the password file. P. -- pir pir@pir.net pir@net.tufts.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message