From owner-freebsd-security Wed Mar 15 12:40:38 2000 Delivered-To: freebsd-security@freebsd.org Received: from axl.ops.uunet.co.za (axl.ops.uunet.co.za [196.31.1.175]) by hub.freebsd.org (Postfix) with ESMTP id 6CA8737BAB5 for ; Wed, 15 Mar 2000 12:39:16 -0800 (PST) (envelope-from sheldonh@axl.ops.uunet.co.za) Received: from sheldonh (helo=axl.ops.uunet.co.za) by axl.ops.uunet.co.za with local-esmtp (Exim 3.13 #1) id 12VKZN-000FXY-00; Wed, 15 Mar 2000 22:39:05 +0200 From: Sheldon Hearn To: Rodrigo Campos Cc: freebsd-security@freebsd.org Subject: Re: wrapping sshd In-reply-to: Your message of "Wed, 15 Mar 2000 17:35:33 -0300." Date: Wed, 15 Mar 2000 22:39:05 +0200 Message-ID: <59739.953152745@axl.ops.uunet.co.za> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Wed, 15 Mar 2000 17:35:33 -0300, Rodrigo Campos wrote: > But my question has nothing to do with inetd, by "wrapping sshd" I mean > compiling it with support to libwrap, wich would make it read the > /etc/hosts.allow file in order to grant or deny access based on the > client hostname or ip address, even when it's running as a daemon. Well, I thought the inetd issue is exactly why that comment is there. Chat to the guy who wrote the file (markm@FreeBSD.org) for confirmation and let me know if I'm wrong. :-) Ciao, Sheldon. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message