Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Jul 2000 18:28:06 +0300 (EEST)
From:      Dmitry Pryanishnikov <dmitry@digital.dp.ua>
To:        Paul Boehmer <pboehmer@seidata.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: ssh2 bypasses host.allow in /etc/login.conf?
Message-ID:  <Pine.BSF.4.21.0007231730360.13036-100000@ff.dsu.dp.ua>
In-Reply-To: <Pine.BSF.4.10.10007230929380.3565-100000@shell.seidata.com>

next in thread | previous in thread | raw e-mail | index | archive | help


Hello!

On Sun, 23 Jul 2000, Paul Boehmer wrote:
> You need to compile ssh2 with tcpwrapper support in order to user the
> host.allow file, it is cleary stated in the documentation.
  ^^^^^^^^^^^^^^^
 Maybe I've missed something, but I mean NOT a file host.allow, but the
BSD-native login class restrictions written in /etc/login.conf, which
checked with auth_hostok() (or login_getclass()/login_getcapstr() as
in sshd.c from ssh1). Of course, make WITH_TCPWRAP=yes doesn't help!


Sincerely, Dmitry

Dnipropetrovsk State University,        E-mail:  dmitry@digital.dp.ua
Physical Faculty,                       WWW:      http://ff.dsu.dp.ua
Department of Experimental Physics      
Dnipropetrovsk, Ukraine                 FTP:  ftp://digital.dp.ua/DEC





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007231730360.13036-100000>