06-19-2010
Don't think that that can be done, as fail2ban can only read the log files and act upon them, it never interferes with a connection directly. For FTP, you could try having it set the message/issue file automatically, but that would apply to all connections. I don't think it's possible for SSH, as there isn't any text sent to the client until it is authenticated.
9 More Discussions You Might Find Interesting
1. Email Antispam Techniques and Email Filtering
Now this is a bit tricky, but works great if you can decide which Top Level Domains or TLDs you want to receive mail We are getting so much spam from countries we never receive useful mail, I've been experimenting with blocking entire TLDs using sendmail access_db as an antispam technique.
... (0 Replies)
Discussion started by: Neo
0 Replies
2. UNIX for Dummies Questions & Answers
Hi everybody !
We have all flavors of Unix / Linux and we want to restrict ftp users to telnet our servers.
We can't disable telnet because we have other users using it.
:confused: Are there any thing that could be done to solve this thing ???
Best regards,
Julio Moreira (11 Replies)
Discussion started by: juliocdrm
11 Replies
3. UNIX for Dummies Questions & Answers
Hi,
We have an application which runs on telnet port, application structure is file based, we have to give write permissions to all the users to all files so that they can work on the system.
Recently we have noticed that all ordinary users can login through ftp and delete any file (... (7 Replies)
Discussion started by: nervous
7 Replies
4. UNIX for Advanced & Expert Users
Hi All,
I have a set of 100 servers , where users login through ssh, with a set of around 4-5 users.
We have copied over the public keys to all the servers, for a passwordless authentication.
Is it possible to block the ssh-keygen command for the users , so that the users that login do not... (5 Replies)
Discussion started by: nua7
5 Replies
5. Solaris
We want to get a notification for all unauthorized sudo access via e-mail to our team DL .. whats the way to do it ? (1 Reply)
Discussion started by: fugitive
1 Replies
6. AIX
Hi all,
I'm using AIX v 5.3
I want to create system users to access through ftp or sftp and restrict those users into specific directory and don't traverse the whole file system just to be restricted within a directory and don't get shell access . i don't want to use any other third party... (7 Replies)
Discussion started by: h@foorsa.biz
7 Replies
7. UNIX for Dummies Questions & Answers
Hey All,
Problem:
I have a application which runs on port 8153 (http) and on 8154 (https). For design reasons i can not block tcp connections to 8153.
How do i forward all requests from http 8153 to https 8154( this would be the ideal solution)
Or
redirect all requests that come to... (2 Replies)
Discussion started by: Arun Kumar
2 Replies
8. Post Here to Contact Site Administrators and Moderators
For some reason Google Chrome sees unix.com as dangerous and has start to block it. I need to select advanced and continue on own risk.
Can you make an effort to remove unix.com form the list of dangerous site from Google.
IE has not this problem. (5 Replies)
Discussion started by: Jotne
5 Replies
9. Shell Programming and Scripting
Hello,
I use the following SSH script to upload *.jpg files via FTP:
#!/usr/bin/expect
set timeout -1
spawn ftp -v -i
expect ""
send "\r"
expect "Password:"
send "\r"
expect "ftp>"
send "mput *.jpg\r"
expect "ftp>"
send "quit\r"
replaced with actual ftp server/account data.
... (5 Replies)
Discussion started by: mrpi007
5 Replies
LEARN ABOUT LINUX
ssh-copy-id
SSH-COPY-ID(1) General Commands Manual SSH-COPY-ID(1)
NAME
ssh-copy-id - install your public key in a remote machine's authorized_keys
SYNOPSIS
ssh-copy-id [-i [identity_file]] [user@]machine
DESCRIPTION
ssh-copy-id is a script that uses ssh to log into a remote machine and append the indicated identity file to that machine's ~/.ssh/autho-
rized_keys file.
If the -i option is given then the identity file (defaults to ~/.ssh/id_rsa.pub) is used, regardless of whether there are any keys in your
ssh-agent. Otherwise, if this:
ssh-add -L
provides any output, it uses that in preference to the identity file.
If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fin-
gerprints (by whatever means) it uses ssh to append them to ~/.ssh/authorized_keys on the remote machine (creating the file, and directory,
if necessary.)
NOTES
This program does not modify the permissions of any pre-existing files or directories. Therefore, if the remote sshd has StrictModes set in
its configuration, then the user's home, ~/.ssh folder, and ~/.ssh/authorized_keys file may need to have group writability disabled manu-
ally, e.g. via
chmod go-w ~ ~/.ssh ~/.ssh/authorized_keys
on the remote machine.
SEE ALSO
ssh(1), ssh-agent(1), sshd(8)
OpenSSH 14 November 1999 SSH-COPY-ID(1)