From owner-freebsd-security Fri Mar 15 12: 5: 5 2002 Delivered-To: freebsd-security@freebsd.org Received: from db.nexgen.com (db.nexgen.com [66.92.98.149]) by hub.freebsd.org (Postfix) with SMTP id 7947E37B402 for ; Fri, 15 Mar 2002 12:05:00 -0800 (PST) Received: (qmail 84544 invoked from network); 15 Mar 2002 20:07:32 -0000 Received: from localhost.nexgen.com (HELO alexus) (root@127.0.0.1) by localhost.nexgen.com with SMTP; 15 Mar 2002 20:07:32 -0000 Message-ID: <001101c1cc5c$af84d460$0100a8c0@alexus> From: "alexus" To: Subject: openssh Date: Fri, 15 Mar 2002 15:04:59 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org is there a way to disable that "banner" when someone telnets to port 22 SSH-1.99-OpenSSH_2.9 FreeBSD localisations 20010713 and/or disable any SSH daemon information retrieval? like: without person having access to my computer, that person can already obtain some of info SSH1 supported yes Supported authentification methods for SSH1 RSA,keyboard interactive,password Supported ciphers for SSH1 3des,blowfish SSH2 supported yes Supported keys exchange algorithm for SSH2 diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 Supported decryption ciphers for SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r ijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se Supported encryption ciphers for SSH2 aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,r ijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se Supported decryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hm ac-md5-96 Supported encryption mac for SSH2 hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hm ac-md5-96 Supported authentification methods for SSH2 publickey,password,keyboard-interactive is there a way to *NOT* allowe user to get any info at all? To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message