ssh --tcp-wrapper support

From: Tru64 User <tru64user_at_yahoo.com>
Date: Thu, 19 Jul 2001 10:30:31 -0700 (PDT)

[First apologies, this is not Tru64 specific...but I
get faster, accurate responses from this list than any
other one!!]


Greetings,

I configured + compiled openssh-2.9p2
-with-tcp-wrapper support
My problem is getting hosts_access file,
(/etc/host.allow) to take argument of a file.
>From 'hosts_access (5) manpage:
A string that begins with a `/' character is treated
as a file name. A host name or address is matched if
it matches any host name or address pattern listed in
the named file. The file format is zero or more lines
with zero or more host name or address patterns
separated
by whitespace. A file name pattern can be used
anywhere a host name or address pattern can be used.

My /etc/hosts.allow file:
rshd: /etc/s_hosts: ( /usr/local/sbin/slv %h %d ) &
telnetd: /etc/s_hosts: ( /usr/local/sbin/slv %h %d ) &
sshd: /etc/s_hosts: ( /usr/local/sbin/slv %h %d ) &

where s_hosts has the list of authorised hosts.
Works well for telnet, rshd, but not for sshd. Users
get access denied, and
When I run tcpdchk, it comes up with:
warning: /etc/hosts.allow, line 14: /etc/s_hosts: bad
net/mask pattern (although not in net/mask
pattern!!..clues??) Only way that it works is if I put
the actual host name in place, or use wildcards
(.somehost.com) or ALL. Not reasonble to expand the
whole list (s_hosts) into this file (hosts.allow).

Other functions, telnetd, ftpd
 only allow hosts in the s_hosts file.
For ssh though, this is not the case. Any ideas?

Thanks in advance.

=====


__________________________________________________
Do You Yahoo!?
Get personalized email addresses from Yahoo! Mail
http://personal.mail.yahoo.com/
Received on Thu Jul 19 2001 - 17:31:12 NZST

This archive was generated by hypermail 2.4.0 : Wed Nov 08 2023 - 11:53:42 NZDT