Auctally ssh has wrapers built into it that work much better then tcpd.
Checkout the AllowUsers and AllowHosts in the documentation of ssh.

I also recently wrote a patch that extends the function of the ssh wrapers
for version 1.2.27, if your intrested it and the readme can be found on
www.sonn.com/~gersh/ssh


Gerry Bash [Gersh | cruid @ EFnet.irc] - Unix Security Admin 
"\xeb\x03\x5f\xeb\x05\xe8\xf8\xff\xff\xff\x31\xd2\xb2\x0a\x31\xc9"
"\xb1\x1a\x01\xf9\x31\xdb\xb3\x01\x31\xc0\xb0\x04\xcd\x80\x31\xc0"
"\xb0\x01\xcd\x80\x44\x4f\x4f\x54\x20\x44\x4f\x4f\x54\x0a\x00";


On Thu, 14 Oct 1999, Anthony T Moran wrote:

> 
> 
> You said:
> 
> > 
> > Hello,
> > 
> > Do you kmown if there is a way to limite the access to a machine? There is
> > a way to configure which users can access a machine using ssh? 
> > 
> > Thanks in advance,
> 
> Hi.
> 
> Best way to do this is to use TCP Wrappers.  
> ftp://ftp.porcupine.org/pub/security/index.html
> 
> Unfortunately, you need to afair, need to compile this into ssh (?)
> See the FAQ's etc.  
> 
> In any case though, if you have felt it necessary to use ssh in the first
> place, then you definitely should use TCP Wrappers to limit and
> monitor access to services on your machine/s as well.  Good thing about
> using ssh with TCP Wrappers is that it provides some basic logging of
> incoming ssh usage on your machine, unless you are using the commercial
> version of ssh which does that for you.
> 
> Have fun,  Tony
> 
> 
> 
> 
> 
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
>      "He who will not reason is a bigot; he who cannot is a fool; 
>       and he who dares not is a slave."    - Sir William Drummond
> 
> We don't inherit the Earth from our ancestors, we borrow it from our kids
> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
> 
> 
> 

Reply via email to