Re: SSH2

From: R. McFarlane (yarhl_at_mcfarlanecomputing.net)
Date: 04/05/05

  • Next message: Steve Buehler: "RE: Last Sunday of the Month"
    Date: Tue, 05 Apr 2005 13:51:27 -0700
    To: General Red Hat Linux discussion list <redhat-list@redhat.com>
    
    

    At 01:20 PM 4/5/2005, Burke, Thomas G., had this to say :

    >All,
    >
    > I've always thought this interesting, so I'll ask... I thought
    > SSH(2) used hosts.deny & hosts.allow. I find it interesting, then, that
    > I get so many (L)users trying to hack my SSH connection. Any
    > thoughts? Maybe I missed something in my setup?

             hosts.deny and hosts.allow are part of TCP wrappers. AFAIK, you
    have to build ssh with support for it, to use these files.

             The ssh "attacks" are part of a "script-kit" or worm trying to
    break in through weak passwords and/or older ssh (v1). These attacks are
    filling up the logs that is for sure. :(

    Sincerely,

    R. McFarlane

    cross platform specialist
    Mac - Linux - windows

    McFarlane Computing
    on-site/remote tutorials, support & training
    (phone) 391-8972
    (fax) 391-8972
    (pager) 413-8577
    (email) techie @ mcfarlanecomputing . net

    -- 
    redhat-list mailing list
    unsubscribe mailto:redhat-list-request@redhat.com?subject=unsubscribe
    https://www.redhat.com/mailman/listinfo/redhat-list
    

  • Next message: Steve Buehler: "RE: Last Sunday of the Month"