Blackhole
Burke, Thomas G.
tg.burke at ngc.com
Mon Apr 11 18:39:40 UTC 2005
In fact, get away from ssh1 - it has some well-known vulnerabilities, that AFAIK, no one has fixed. Got to ssh2. See www.ssh.org.
-Tom
-----Original Message-----
From: redhat-list-bounces at redhat.com [mailto:redhat-list-bounces at redhat.com]On Behalf Of Chris Kenward
Sent: Monday, April 11, 2005 2:20 PM
To: 'General Red Hat Linux discussion list'
Subject: RE: Blackhole
Hi Reuben
> 2. Run several rootkit detection. Rookit hunter ( http://www.rootkit.nl/)
> and chkrootkit ( http://www.chkrootkit.org/) are two commons program for
> rootkit detection.
Have now used therootkit as well... Impressive!! This is one of the items it
came up with... How do I change SSH so that access directly as root is NOT
allowed?
* Check: SSH
Searching for sshd_config...
Found /etc/ssh/sshd_config
Checking for allowed root login...
Watch out Root login possible. Possible risk!
Regards
Chris
--
redhat-list mailing list
unsubscribe mailto:redhat-list-request at redhat.com?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list
More information about the redhat-list
mailing list