Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 7 Oct 2004 12:54:25 -0600
From:      Mark Ogden <ogden@eng.utah.edu>
To:        Mark Skurzynski <mark@lomag.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Question restricting ssh access for some users only
Message-ID:  <20041007185425.GB25539@yem.eng.utah.edu>
In-Reply-To: <080b01c4ac9e$90584250$0a13a8c0@lomag.net>
References:  <cvuam0t1l2u7npnigk6oqrlq288hlu0mgn@4ax.com> <20041007195417.430a8b5c@ariel.office.volker.de> <20041007180630.GA25130@yem.eng.utah.edu> <79722fad041007112227c3c241@mail.gmail.com> <20041007183400.GA25339@yem.eng.utah.edu> <3C735693-1890-11D9-B63E-000A95CD9660@uncompiled.com> <080b01c4ac9e$90584250$0a13a8c0@lomag.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Mark Skurzynski on Thu, Oct 07, 2004 at 02:50:49PM -0400 wrote:
> Hi Fellow Marks,
> 
> I normally don't reply here however the simple solution is to run a 2nd
> instance of sshd on any random port you choose, ie. "sshd -f
> /etc/ssh/sshd_config_private" or whatever you choose. You could then easily
> firewall that port and only allow specific IP's to connnect.

Yes, that was our second idea. But we feel theres got to be a better
way. 

-Mark



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20041007185425.GB25539>