Le 12240ième jour après Epoch, Mario Ohnewald écrivait: > Hello! > >>-----Original Message----- >>From: Anne Carasik [mailto:[EMAIL PROTECTED] >>Sent: Monday, July 07, 2003 5:05 PM >>To: [EMAIL PROTECTED] >>Cc: debian-security@lists.debian.org >>Subject: Re: configure ssh-access >> >> >>Why not just limit the access through SSH public key? >>It sounds like that would accomplish what you're trying >>to do. > > I think this problem should not be solved with configuring sshd.
Wrong... You can configure sshd to accept only login from recognized keys, and let the firewall open. > I solved it with iptables script which resolv my dynamic host every 5mins, > and then reload the firewall if needed. So, on some case, you must wait 5 mins to connect ? > A ssh solution has the disadvantage that if it is buggy, a sshd config > change might not save your box from unallowed access. That is my i block my > ssh daemon, cause the posibility is there that there might be a ssh exploit > soon ;) And what if dynamic host not correctly set ? Somebody getting your previous IP have 5 mins to accomplish some weird job. And it's 4.9 mins more than needed :) -- DOS: n., A small annoying boot virus that causes random spontaneous system crashes, usually just before saving a massive project. Easily cured by UNIX. See also MS-DOS, IBM-DOS, DR-DOS. (from David Vicker's .plan) -- François TOURDE - tourde.org - 23 rue Bernard GANTE - 93250 VILLEMOMBLE Tél: 01 49 35 96 69 - Mob: 06 81 01 81 80 eMail: mailto:[EMAIL PROTECTED] - URL: http://francois.tourde.org/