Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Mar 2006 21:59:10 +0200
From:      Daniel Gerzo <danger@rulez.sk>
To:        Graham North <northg@shaw.ca>
Cc:        mark@mkproductions.org, questions freebsd <freebsd-questions@freebsd.org>
Subject:   Re: Tightening up ssh
Message-ID:  <1791241722.20060326215910@rulez.sk>
In-Reply-To: <4426F0EB.5040109@shaw.ca>
References:  <4426F0EB.5040109@shaw.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi Graham,

Sunday, March 26, 2006, 9:52:11 PM, you wrote about:

> Does this mean that there is a way to run ssh, but only allow
> certain users to use it.   My default seems to have been that if
> someone has a username and password they can access ssh (except root
> as "PermitRootLogin no" is the default).   The ssh port seems to be
> the most heavily attacked one on my machine and so I recently took
> to blocking port 22.   My preference would be to enable it to only
> one user and give them an obscure username and strong password. 
> Root is not currently allowed access by default in the setup.

check the AllowUsers and AllowGroups directive in sshd_config(5)

-- 
Best Regards,

 DanGer, ICQ: 261701668  | e-mail protecting at: http://www.2pu.net/
 http://danger.rulez.sk  | proxy list at:        http://www.proxy-web.com/
                         | FreeBSD - The Power to Serve!

[ "Garrick Utley in Allie Sheedy's Frankenstein..."  Tom Servo ]




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1791241722.20060326215910>