Date: Sun, 26 Mar 2006 21:59:10 +0200 From: Daniel Gerzo <danger@rulez.sk> To: Graham North <northg@shaw.ca> Cc: mark@mkproductions.org, questions freebsd <freebsd-questions@freebsd.org> Subject: Re: Tightening up ssh Message-ID: <1791241722.20060326215910@rulez.sk> In-Reply-To: <4426F0EB.5040109@shaw.ca> References: <4426F0EB.5040109@shaw.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Graham, Sunday, March 26, 2006, 9:52:11 PM, you wrote about: > Does this mean that there is a way to run ssh, but only allow > certain users to use it. My default seems to have been that if > someone has a username and password they can access ssh (except root > as "PermitRootLogin no" is the default). The ssh port seems to be > the most heavily attacked one on my machine and so I recently took > to blocking port 22. My preference would be to enable it to only > one user and give them an obscure username and strong password. > Root is not currently allowed access by default in the setup. check the AllowUsers and AllowGroups directive in sshd_config(5) -- Best Regards, DanGer, ICQ: 261701668 | e-mail protecting at: http://www.2pu.net/ http://danger.rulez.sk | proxy list at: http://www.proxy-web.com/ | FreeBSD - The Power to Serve! [ "Garrick Utley in Allie Sheedy's Frankenstein..." Tom Servo ]
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1791241722.20060326215910>