On Mon, 2003-03-10 at 17:41, Lorin wrote:
> Hello,
> I have a little problem with the configuration of hosts.allow. If a certain
> rule matches i want a command to be executed.
> i.e.
> ---
> hosts.deny
> ALL:ALL
> ---
> hosts.allow
> fingerd:192.168.1.*:(fingerd @%h| mail -s "finger from %h" root)
Yeah, I'm having the same problem too, I haven't really looked into
fixing it though.
On Wed, 2003-03-12 at 20:53, [EMAIL PROTECTED] wrote:
> My local ISP recently replaced its BSD-based webmail with Squirrelmail.
> Very nice, but the following bug has appeared whenever I try to "download"
> or "v
The OpenSSH RPMs are compiled with libwrap support built-in.
hosts.allow/deny are both recognised and used.
Use something similar to:
sshd: 127.0.0.1, .domain.org
in your /etc/hosts.allow or hosts.deny files.
However, you can use sshd_config for hosts access, as well as
AllowGroups and DenyGro
On Thu, 2003-03-20 at 15:54, Justin Zygmont wrote:
> On 20 Mar 2003, Piero Calucci wrote:
>
> > On Thu, 2003-03-20 at 02:51, Dan G wrote:
> > > How can I restrict which users have SSH access to a server? I did not
> > > see any settings in sshd_config. Does this have to be done with Pam? If
> > >
On Fri, 2003-03-21 at 01:53, Justin Zygmont wrote:
> just go to a mirror site and download the new ernel package, then type rpm
> -Uvh packagename and reboot. This vulnerability sounds like it would be
> hard to exploit.
Hard to exploit? The exploit is out in the wild.
--
Psyche-list mai