On Sat, 9 Apr 2005, James R. Campbell wrote: > If you use PAM, have a read on: 'man pam_fail_delay'. Also, if you are doing > this because someone is banging on your sshd from say the Internet, then you > should also look at the following sshd_config options: > PermitRootLogin > AllowUsers > > Ideally, you'd want to setup RSA key based authorization, and disable regular > logins completely. This is not always acceptable for people, but generally > seems to be the most 'secure' way of setting up remote ssh access.
Its on a shared web server. I am using rssh as the login shell to provide scp/sftp access. Its not practical to use AllowUsers. -- -- [email protected] mailing list

