On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:
>
> Howdy all,
>
>Not debian specific, but this is the best batch of security minds I
> have access too so I figured I'd see if this interests anyone.
>
> I need to set up some Xterminal replacemnets - linux boxes that will
> most
On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:
>
> Howdy all,
>
>Not debian specific, but this is the best batch of security minds I
> have access too so I figured I'd see if this interests anyone.
>
> I need to set up some Xterminal replacemnets - linux boxes that will
> mos
On Sat, Aug 04, 2001 at 12:30:20AM +0200, Tobias wrote:
> Hello!
>
> you can disable password login in sshd and only run ssh with public
> key authentication, just don't forget to put a root owned non-writable
> folder or file called ".ssh" and ".ssh2" in the accounts you do not wish
> people to l
On Sat, Aug 04, 2001 at 12:30:20AM +0200, Tobias wrote:
> Hello!
>
> you can disable password login in sshd and only run ssh with public
> key authentication, just don't forget to put a root owned non-writable
> folder or file called ".ssh" and ".ssh2" in the accounts you do not wish
> people to
On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:
> 1. How to dissallow network connections to this guest account? I don't
> want anyone ssh'ing in, but I still want to be able to remotely administer
> the machines.
man sshd --
DenyUsers
This keyword can be followed
On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:
> 1. How to dissallow network connections to this guest account? I don't
> want anyone ssh'ing in, but I still want to be able to remotely administer
> the machines.
man sshd --
DenyUsers
This keyword can be followed
On Sat, Aug 04, 2001 at 12:30:20AM +0200, Tobias wrote:
> Hello!
>
> you can disable password login in sshd and only run ssh with public
> key authentication, just don't forget to put a root owned non-writable
> folder or file called ".ssh" and ".ssh2" in the accounts you do not wish
> people to l
On Sat, Aug 04, 2001 at 12:30:20AM +0200, Tobias wrote:
> Hello!
>
> you can disable password login in sshd and only run ssh with public
> key authentication, just don't forget to put a root owned non-writable
> folder or file called ".ssh" and ".ssh2" in the accounts you do not wish
> people to
On Fri, Aug 03, 2001 at 03:38:28PM -0700, Vineet Kumar wrote:
>
> * David Ehle ([EMAIL PROTECTED]) [010803 14:53]:
> > Thanks Andrew, Thanks Jim.
> >
> >I'll layer them on and sleep better tonight ;).
> >
> > Stopping the middle button menu behavior is still causing me to pull my
> > hair ou
* David Ehle ([EMAIL PROTECTED]) [010803 14:53]:
> Thanks Andrew, Thanks Jim.
>
>I'll layer them on and sleep better tonight ;).
>
> Stopping the middle button menu behavior is still causing me to pull my
> hair out though. Tried changing the behavior of the middle button in the
> /enlighte
Hello!
you can disable password login in sshd and only run ssh with public
key authentication, just don't forget to put a root owned non-writable
folder or file called ".ssh" and ".ssh2" in the accounts you do not wish
people to log in to.
And I agree with Jim Breton about locking down PAM as muc
On Fri, Aug 03, 2001 at 08:09:25PM +, Jim Breton wrote:
> You can also disable access with PAM, using the "sshd" pam control file.
> Just use pam_deny.so to deny authentication.
/me pops foot out of mouth
When I wrote that I was not considering your previous statement of
needing to still
* David Ehle ([EMAIL PROTECTED]) [010803 14:53]:
> Thanks Andrew, Thanks Jim.
>
>I'll layer them on and sleep better tonight ;).
>
> Stopping the middle button menu behavior is still causing me to pull my
> hair out though. Tried changing the behavior of the middle button in the
> /enlight
Thanks Andrew, Thanks Jim.
I'll layer them on and sleep better tonight ;).
Stopping the middle button menu behavior is still causing me to pull my
hair out though. Tried changing the behavior of the middle button in the
/enlightenment/keybind.cfg file - both global and local version, but it
d
On Fri, Aug 03, 2001 at 01:56:26PM -0400, Andrew Lattis wrote:
> 1. Check the openssh man page for AllowGroups and AllowUsers, both allow you
> to
> specify users that are allowed to login, everyone else is denied.
You can also disable access with PAM, using the "sshd" pam control file.
Just use
Hello!
you can disable password login in sshd and only run ssh with public
key authentication, just don't forget to put a root owned non-writable
folder or file called ".ssh" and ".ssh2" in the accounts you do not wish
people to log in to.
And I agree with Jim Breton about locking down PAM as mu
On Fri, 03 Aug 2001 13:46:10 David Ehle wrote:
>
> Howdy all,
>
>Not debian specific, but this is the best batch of security minds I
> have access too so I figured I'd see if this interests anyone.
>
> I need to set up some Xterminal replacemnets - linux boxes that will
> mostly only be ru
On Fri, Aug 03, 2001 at 01:56:26PM -0400, Andrew Lattis wrote:
> 1. Check the openssh man page for AllowGroups and AllowUsers, both allow you to
> specify users that are allowed to login, everyone else is denied.
You can also disable access with PAM, using the "sshd" pam control file.
Just use pa
Howdy all,
Not debian specific, but this is the best batch of security minds I
have access too so I figured I'd see if this interests anyone.
I need to set up some Xterminal replacemnets - linux boxes that will
mostly only be running netscape and ssh.
They are going to be used for visiti
Howdy all,
Not debian specific, but this is the best batch of security minds I
have access too so I figured I'd see if this interests anyone.
I need to set up some Xterminal replacemnets - linux boxes that will
mostly only be running netscape and ssh.
They are going to be used for visit
20 matches
Mail list logo