Date: Fri, 11 May 2001 07:57:49 -0400 From: Mike Tancsa <mike@sentex.net> To: Jussi Jaurola <gobbe@gobbe.net> Cc: security@FreeBSD.ORG Subject: Re: preventing direct root login on telnetd Message-ID: <4.2.2.20010511075525.05d665b0@192.168.0.12> In-Reply-To: <Pine.BSF.4.21.0105110856000.3739-100000@gobbe.net> References: <4.2.2.20010511000303.036916f8@192.168.0.12>
next in thread | previous in thread | raw e-mail | index | archive | help
At 08:57 AM 5/11/2001 +0300, Jussi Jaurola wrote: >Use /etc/hosts.allow. But I think that telnet protocol is so crappy that >use ssh instead? The machine is for customer access. I cannot force them to use ssh all the time so must keep telnet open as an option. How can you use /etc/hosts.allow which wraps the service to prevent it from being used from a certain IP/host/network. I dont see how you can use it to prevent a certain user. ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Network Administration, mike@sentex.net Sentex Communications www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20010511075525.05d665b0>