Displaying 5 results from an estimated 5 matches for "aisa".
Did you mean:
aia
2000 Feb 07
0
openssh (fwd)
...ng Group, Los Alamos National Lab
See http://home.lanl.gov/mfisk/ for contact information
---------- Forwarded message ----------
Date: Thu, 3 Feb 2000 15:33:34 +0100 (MET)
From: Daniel Kouril <kouril at informatics.muni.cz>
Subject: openssh
To: heimdal-discuss at sics.se
X-Sender: kouril at aisa
I made a patch supporting heimdal.
http://www.fi.muni.cz/~kouril/openssh-1.2.1pre24.patch
2000 Apr 19
2
ssh and chroot...
I have a RedHat 6.0 x86 server which is serving a number of minor things, which I wish to add shell access to.
I'm currently running sshd and am quite happy with it, the exceptiong being that I am unable to make sshd perform a chroot for shell account users.
I have been reading man pages and howto's, many of which discuss sshd or chroot, but never the two together.
Is this not an
1998 Aug 05
6
Problem with TCP_wrappers
Hi,
I''m running into something weird here.
I''m using RH5.1 with tcp_wrappers 7.6.
The syntax for hosts.allow and hosts.deny is:
<service list> : <access list> [ : <shell_command> ]
Everything works when I _don''t_ use the shell_command.
I used the _exact_ line as in the man-pages utilising "safe_finger" (comes
with tcp_wrappers), tcpdchk
1997 Oct 02
2
SNI-19:BSD lpd vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
##### ## ## ######
## ### ## ##
##### ## # ## ##
## ## ### ##
##### . ## ## . ###### .
Secure Networks Inc.
Security Advisory
1998 Aug 02
0
ipportfw - security
...v ... ...
It works, but gives me a "twist" syslog message for each connection.
On RH4.2 the tcp_wrappers' setenv worked OK. In 5.0 and 5.1 it does not
work.
-Yenya
--
\ Jan "Yenya" Kasprzak <kas at fi.muni.cz> http://www.fi.muni.cz/~kas/
\\ PGP: finger kas at aisa.fi.muni.cz 0D99A7FB206605D7 8B35FCDE05B18A5E //
\\\ Czech Linux Homepage: http://www.linux.cz/ ///
If there are race conditions in programs fix them. The "my programs suck fix
something else" mentality leads you to things like Java. -- Alan Cox
From m...