Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 May 2001 07:57:49 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Jussi Jaurola <gobbe@gobbe.net>
Cc:        security@FreeBSD.ORG
Subject:   Re: preventing direct root login on telnetd
Message-ID:  <4.2.2.20010511075525.05d665b0@192.168.0.12>
In-Reply-To: <Pine.BSF.4.21.0105110856000.3739-100000@gobbe.net>
References:  <4.2.2.20010511000303.036916f8@192.168.0.12>

next in thread | previous in thread | raw e-mail | index | archive | help
At 08:57 AM 5/11/2001 +0300, Jussi Jaurola wrote:
>Use /etc/hosts.allow. But I think that telnet protocol is so crappy that
>use ssh instead?


The machine is for customer access.  I cannot force them to use ssh all the 
time so must keep telnet open as an option.  How can you use 
/etc/hosts.allow which wraps the service to prevent it from being used from 
a certain IP/host/network. I dont see how you can use it to prevent a 
certain user.

         ---Mike
--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Network Administration,     			  mike@sentex.net
Sentex Communications                 		  www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20010511075525.05d665b0>