|
发表于 2003-3-1 18:36:10
|
显示全部楼层
ssh?
windows可以使用ssh?
以下是两个配置文件,我怀疑它们有问题!
/etc/hosts.deny:
#
# hosts.deny This file describes the names of the hosts which are
# *not* allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# See man hosts_access(5) for more information.
ALL: ALL
还有一个是/etc/hosts.allow
#
# hosts.allow This file describes the names of the hosts which are
# allowed to use the local INET services, as decided
# by the '/usr/sbin/tcpd' server.
#
# See man hosts_access(5) for details.
#
# The settings in /etc/hosts.allow take precedence over the those in
# /etc/hosts.deny.
#
# Note: The tcp_wrappers (configured by /etc/hosts.allow and /etc/hosts.deny)
# only affect services that are called via /usr/sbin/tcpd. Check out
# /etc/inetd.conf to find out if a service started by inetd goes through
# tcp_wrappers.
# Some services are not started via inetd and still use
# tcp_wrappers (e.g. sshd, portmap (NFS) -- see below for sample setups).
#
# Examples of services which usually run as stand alone servers and
# don't make use of tcp_wrappers are Apache and Sendmail.
#
# Note2: Security scanners like nmap(1) will report blocked services as being
# open, because an initial connection is always established and only
# dropped later, if the connection is not approved by the tcp_wrappers
# configuration.
################################################################################
# Local host
# Allow all requests from localhost
ALL : 127.0.0.1
################################################################################
# Telnet
# Allow telnet logins from sample.foobar.edu
# Warning: telnet is inherently insecure as a protocol. All network traffic,
# including authentication information (login and password) are transmitted
# as clear text. Use secure alternatives (e.g. ssh).
#in.telnetd: sample.foobar.edu
All : All
################################################################################
# ProFTP (standard TurboLinux ftp server)
# Allow proftpd (TurboLinux default ftp daemon) logins from sample.foobar.edu
# Warning: the authentication information for ftp goes as clear text over
# the net. This is especially dangerous if the same login/password combination
# can be used for any shell logins (telnet, ssh). Make sure remote ftp users
# don't have a shell login.
#in.proftpd: sample.foobar.edu
################################################################################
# Portmap (required for an NFS server)
# Allow connects to portmap from sample.foobar.edu. This is required if you
# want to provide NFS services.
#portmap: sample.foobar.edu
################################################################################
# ssh
# Allow connets to sshd from sample.foobar.edu.
#sshd: sample.foobar.edu
################################################################################
# Allow all requests from hosts in .foobar.edu with one exception (notice the
# leading dot)
#ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
sshd : ALL |
|