Sponsored Content
Full Discussion: ssh security
Operating Systems AIX ssh security Post 67733 by bert.n on Saturday 26th of March 2005 02:28:01 PM
Old 03-26-2005
Power ssh security

Hi all,

I have AIX 5.2 and thinking of using ssh.

Is there a way by using ssh/sshd to disable access to range of IP addresses?

With telnet there is TCP_WRAPPER.

Can I use the ssh config files for that?

I heard that I need to compile ssh with tcp_wrapper. If yes how do I do that?

thanks
Bert.n
 

3 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

RSH or SSH & security

I am wanting to run backups to remote servers ie: A to B's tape drive and B to A's tape drive. Should I use rsh or ssh? It looks as those rsh opens up security issues (the backup has to run as root). Which one should be used and does someone have the links to set up allowed connections. In what I... (7 Replies)
Discussion started by: jphess
7 Replies

2. UNIX for Dummies Questions & Answers

does disabling requiretty in sudo have security implications with SSH?

I've run into an issue running rsync remotely via SSH/sudo ... I get the error sudo: sorry, you must have a tty to run sudo I know that I can disable the tty in sudoers file ( !requiretty), but my question is: is there a security risk by disabling requiretty with SSH/rsync/sudo? Is... (0 Replies)
Discussion started by: kettlewell
0 Replies

3. SuSE

Auditors want more security with root to root access via ssh keys

I access over 100 SUSE SLES servers as root from my admin server, via ssh sessions using ssh keys, so I don't have to enter a password. My SUSE Admin server is setup in the following manner: 1) Remote root access is turned off in the sshd_config file. 2) I am the only user of this admin... (6 Replies)
Discussion started by: dvbell
6 Replies
SSH-KEYSIGN(8)						    BSD System Manager's Manual 					    SSH-KEYSIGN(8)

NAME
ssh-keysign -- ssh helper program for host-based authentication SYNOPSIS
ssh-keysign DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with SSH protocol version 2. ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting EnableSSHKeysign to ``yes''. ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen- tication. FILES
/etc/ssh/ssh_config Controls whether ssh-keysign is enabled. /etc/ssh/ssh_host_dsa_key /etc/ssh/ssh_host_ecdsa_key /etc/ssh/ssh_host_rsa_key These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read- able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host- based authentication is used. /etc/ssh/ssh_host_dsa_key-cert.pub /etc/ssh/ssh_host_ecdsa_key-cert.pub /etc/ssh/ssh_host_rsa_key-cert.pub If these files exist they are assumed to contain public certificate information corresponding with the private keys above. SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8) HISTORY
ssh-keysign first appeared in OpenBSD 3.2. AUTHORS
Markus Friedl <markus@openbsd.org> BSD
August 31, 2010 BSD
All times are GMT -4. The time now is 05:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy