On Sat, 9 Apr 2005, James R. Campbell wrote:

> If you use PAM, have a read on: 'man pam_fail_delay'.  Also, if you are doing
> this because someone is banging on your sshd from say the Internet, then you
> should also look at the following sshd_config options:
> PermitRootLogin
> AllowUsers
>
> Ideally, you'd want to setup RSA key based authorization, and disable regular
> logins completely.  This is not always acceptable for people, but generally
> seems to be the most 'secure' way of setting up remote ssh access.

Its on a shared web server. I am using rssh as the login shell to provide
scp/sftp access. Its not practical to use AllowUsers.


-- 

--
[email protected] mailing list

Reply via email to