* Patrick ([EMAIL PROTECTED]) [051127 01:06]:
> Thanks Steve. I've just tested your solution and it's working fine. I
> invoked a second instance of sshd using a different configuration file,
> i.e.
>
> ssh -f /etc/ssh/sshd_conf-internal
>
> which binds to port 22 all allows all users to login. T
Thanks Steve. I've just tested your solution and it's working fine. I
invoked a second instance of sshd using a different configuration file,
i.e.
ssh -f /etc/ssh/sshd_conf-internal
which binds to port 22 all allows all users to login. The (original)
file /etc/ssh/sshd_conf binds to 1022, and is
On Thu, 24 Nov 2005, Patrick wrote:
> I have an server running sshd on Sarge. I want all users to be able to
> access the computer from within the internal network - but restrict
> access from the internet (to users in a particular group). Can this be
> achieved by combining the /etc/hosts.allow o
Patrick wrote:
I have an server running sshd on Sarge. I want all users to be able to
access the computer from within the internal network - but restrict
access from the internet (to users in a particular group). Can this be
achieved by combining the /etc/hosts.allow or /etc/hosts.deny files and
I would likely restrict access to ssh from external, if at all possible.
I realize that this isn't always possible but it should be possible to
at least narrow down access to certain IP ranges.
For this particular problem I'm assuming there are two NICs in the
computer, one with an IP in private
I have an server running sshd on Sarge. I want all users to be able to
access the computer from within the internal network - but restrict
access from the internet (to users in a particular group). Can this be
achieved by combining the /etc/hosts.allow or /etc/hosts.deny files and
the AllowGroup (o
6 matches
Mail list logo