Date: Sun, 23 Jul 2000 18:28:06 +0300 (EEST) From: Dmitry Pryanishnikov <dmitry@digital.dp.ua> To: Paul Boehmer <pboehmer@seidata.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: ssh2 bypasses host.allow in /etc/login.conf? Message-ID: <Pine.BSF.4.21.0007231730360.13036-100000@ff.dsu.dp.ua> In-Reply-To: <Pine.BSF.4.10.10007230929380.3565-100000@shell.seidata.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello! On Sun, 23 Jul 2000, Paul Boehmer wrote: > You need to compile ssh2 with tcpwrapper support in order to user the > host.allow file, it is cleary stated in the documentation. ^^^^^^^^^^^^^^^ Maybe I've missed something, but I mean NOT a file host.allow, but the BSD-native login class restrictions written in /etc/login.conf, which checked with auth_hostok() (or login_getclass()/login_getcapstr() as in sshd.c from ssh1). Of course, make WITH_TCPWRAP=yes doesn't help! Sincerely, Dmitry Dnipropetrovsk State University, E-mail: dmitry@digital.dp.ua Physical Faculty, WWW: http://ff.dsu.dp.ua Department of Experimental Physics Dnipropetrovsk, Ukraine FTP: ftp://digital.dp.ua/DEC To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007231730360.13036-100000>