Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-28 Thread op
Also sprach Guillem Jover: > Use pam_access. > > in /etc/security/access.conf > > -:localnetuser1 localnetuser2:ALL EXCEPT LOCAL .localdomain > > in /etc/pam.d/ssh after "account requiered pam_unix.so" > > account requiered pam_access.so > > hope that helps Thanks a bunch to you Guill

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-28 Thread op
Also sprach Guillem Jover: > Use pam_access. > > in /etc/security/access.conf > > -:localnetuser1 localnetuser2:ALL EXCEPT LOCAL .localdomain > > in /etc/pam.d/ssh after "account requiered pam_unix.so" > > account requiered pam_access.so > > hope that helps Thanks a bunch to you Guil

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread Guillem Jover
On Tue, Nov 27, 2001 at 10:23:57AM +0100, op wrote: > This isn't debian specific but ... > > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > ssh. But I'd like some more control. I'd like to control which subnets user x > can connect from. Some should be allowed to c

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread Christian Kurz
On 27/11/01, martin f krafft wrote: > * op <[EMAIL PROTECTED]> [2001.11.27 10:23:57+0100]: > > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > > ssh. But I'd like some more control. I'd like to control which subnets user > > x > > can connect from. Some should be al

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread Guillem Jover
On Tue, Nov 27, 2001 at 10:23:57AM +0100, op wrote: > This isn't debian specific but ... > > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > ssh. But I'd like some more control. I'd like to control which subnets user x > can connect from. Some should be allowed to

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread martin f krafft
* Wichert Akkerman <[EMAIL PROTECTED]> [2001.11.27 12:23:04+0100]: > The @HOST bit may be new in OpenSSH 3 though. yes. and it can't take a network, so you'd have to enter one entry per user/machine permutation... -- martin; (greetings from the heart of the sun.) \ echo mailto

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread Christian Kurz
On 27/11/01, martin f krafft wrote: > * op <[EMAIL PROTECTED]> [2001.11.27 10:23:57+0100]: > > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > > ssh. But I'd like some more control. I'd like to control which subnets user x > > can connect from. Some should be allowe

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread KOZMAN Balint
On Tue, 27 Nov 2001, martin f krafft wrote: > * op <[EMAIL PROTECTED]> [2001.11.27 10:23:57+0100]: > > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > > ssh. But I'd like some more control. I'd like to control which subnets user > > x > > can connect from. Some sho

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread martin f krafft
* Wichert Akkerman <[EMAIL PROTECTED]> [2001.11.27 12:23:04+0100]: > The @HOST bit may be new in OpenSSH 3 though. yes. and it can't take a network, so you'd have to enter one entry per user/machine permutation... -- martin; (greetings from the heart of the sun.) \ echo mailt

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread Wichert Akkerman
Previously martin f krafft wrote: > nope, this isn't possible with the current sshd. an interesting > feature though... >From the sshd manpage: AllowUsers This keyword can be followed by a list of user names, separated by spaces. If specified, login is allowed only

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread martin f krafft
* op <[EMAIL PROTECTED]> [2001.11.27 10:23:57+0100]: > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > ssh. But I'd like some more control. I'd like to control which subnets user x > can connect from. Some should be allowed to connect from anywhere but some > should

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread KOZMAN Balint
On Tue, 27 Nov 2001, martin f krafft wrote: > * op <[EMAIL PROTECTED]> [2001.11.27 10:23:57+0100]: > > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > > ssh. But I'd like some more control. I'd like to control which subnets user x > > can connect from. Some should

[OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread op
This isn't debian specific but ... I specify the users in /ets/ssh/sshd_config who are allowed to connect via ssh. But I'd like some more control. I'd like to control which subnets user x can connect from. Some should be allowed to connect from anywhere but some should only be able to conect f

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread Wichert Akkerman
Previously martin f krafft wrote: > nope, this isn't possible with the current sshd. an interesting > feature though... >From the sshd manpage: AllowUsers This keyword can be followed by a list of user names, separated by spaces. If specified, login is allowed onl

Re: [OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread martin f krafft
* op <[EMAIL PROTECTED]> [2001.11.27 10:23:57+0100]: > I specify the users in /ets/ssh/sshd_config who are allowed to connect via > ssh. But I'd like some more control. I'd like to control which subnets user x > can connect from. Some should be allowed to connect from anywhere but some > shoul

[OT] resctrict ssh to localnet for some users but not for others.

2001-11-27 Thread op
This isn't debian specific but ... I specify the users in /ets/ssh/sshd_config who are allowed to connect via ssh. But I'd like some more control. I'd like to control which subnets user x can connect from. Some should be allowed to connect from anywhere but some should only be able to conect