SSH2
Burke, Thomas G.
tg.burke at ngc.com
Wed Apr 6 12:03:29 UTC 2005
Certainly, I remeber it worked with ssh1... I got my ssh2 from ssh.org (.com?)... Maybe I'll go through my compile options & see if I can find it in the makefile.
-Tom
-----Original Message-----
From: redhat-list-bounces at redhat.com [mailto:redhat-list-bounces at redhat.com]On Behalf Of R. McFarlane
Sent: Tuesday, April 05, 2005 4:51 PM
To: General Red Hat Linux discussion list
Subject: Re: SSH2
At 01:20 PM 4/5/2005, Burke, Thomas G., had this to say :
>All,
>
> I've always thought this interesting, so I'll ask... I thought
> SSH(2) used hosts.deny & hosts.allow. I find it interesting, then, that
> I get so many (L)users trying to hack my SSH connection. Any
> thoughts? Maybe I missed something in my setup?
hosts.deny and hosts.allow are part of TCP wrappers. AFAIK, you
have to build ssh with support for it, to use these files.
The ssh "attacks" are part of a "script-kit" or worm trying to
break in through weak passwords and/or older ssh (v1). These attacks are
filling up the logs that is for sure. :(
Sincerely,
R. McFarlane
cross platform specialist
Mac - Linux - windows
McFarlane Computing
on-site/remote tutorials, support & training
(phone) 391-8972
(fax) 391-8972
(pager) 413-8577
(email) techie @ mcfarlanecomputing . net
--
redhat-list mailing list
unsubscribe mailto:redhat-list-request at redhat.com?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list
More information about the redhat-list
mailing list