ssh-scan

John van Zantvoort snl.jydawg at gmail.com
Mon May 8 08:38:50 UTC 2006


Greg,

the two needn't be related but as Karl sugested checking your system
and beefing up
security seems prudent. Also if your system is connected to a
localnetwork see if any
security scans are done.

For me checking my own security through e.g. nessus, nmap, chkrootkit
helped identify
security flaws that where a result of (my) poor installation skills or
someone elses doing
before anyone else found them. Regularly checking your own security is
good practise
anyway.

If you really need ssh access try looking at
http://chrootssh.sourceforge.net/ this way you
can limit access to a system through use of a chrooted login.

--
Met vriendelijke groeten/with kind regards

        John van Zantvoort

---

Paranoia is simply an optimistic outlook on life.

GCM d- s+:+ a- C+ UL+++ P+++ L++ E--- W++ N+ o K-
w-- O- M- V- PS+ PE- Y+ PGP+ t+ 5 X- R- tv b+ DI++
D+ G e h- r++ y+




More information about the redhat-list mailing list