On Tue, 4 Mar 2003, Kevin Kinsey, DaleCo, S.P. wrote:

> > him/her/it access to your sshd daemon. NOTE: It is 'normally not a
> good
> > idea' to do this, but if you don't want to rebuild with a firewall
> > configured kernel it will suffice.
> >
> And the reason it's not a "good idea"?  I've always
> assumed it was because you didn't want to be
> on vacation, at a friends house, or suddenly have
> your ISP switch subnets on you and lock you out
> of your box...
> 
> Absolutely nothing wrong with denying the
> supposed "cracker's" IP;  AAMOF, go over
> to ARIN or APNIC or such and ditch entire
> Class A nets that you'll never touch...I'll never
> be in SE Asia, for example...
> 
> I use a dual strategy here.  One machine only
> trusts a second; on the second box I deny
> the known bad guyz and let most others try...
> ...Needless to say, the really important stuff
> is on the first box...
> 

I was only quoting the default hosts.allow line for sshd which states:

# Wrapping sshd(8) is not normally a good idea... 

This is no reason not to use it since in the man for sshd it states:

/etc/hosts.allow, /etc/hosts.deny

Access controls that should be enforced by tcp-wrappers are defined
here.  Further details are described in hosts_access(5).

R.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-questions" in the body of the message

Reply via email to