Date: Fri, 11 May 2001 07:57:49 -0400 From: Mike Tancsa <mike@sentex.net> To: Jussi Jaurola <gobbe@gobbe.net> Cc: security@FreeBSD.ORG Subject: Re: preventing direct root login on telnetd Message-ID: <4.2.2.20010511075525.05d665b0@192.168.0.12> In-Reply-To: <Pine.BSF.4.21.0105110856000.3739-100000@gobbe.net> References: <4.2.2.20010511000303.036916f8@192.168.0.12>
index | next in thread | previous in thread | raw e-mail
At 08:57 AM 5/11/2001 +0300, Jussi Jaurola wrote:
>Use /etc/hosts.allow. But I think that telnet protocol is so crappy that
>use ssh instead?
The machine is for customer access. I cannot force them to use ssh all the
time so must keep telnet open as an option. How can you use
/etc/hosts.allow which wraps the service to prevent it from being used from
a certain IP/host/network. I dont see how you can use it to prevent a
certain user.
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Network Administration, mike@sentex.net
Sentex Communications www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20010511075525.05d665b0>
