Re: MORE SSH Hacking: heads-up

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On all my systems I create a "remote" group and add only those users who
> are responsible enough to have shell access.  Then
> in /etc/ssh/sshd_config I add the following:
> 
> PermitRootLogin no
> AllowGroups remote

Mentioned this on another thread, but it's relevant here too. You can
do the same thing but have it affect all PAM-enabled services by
putting something like the following in /etc/security/access.conf

-:ALL EXCEPT remotees:ALL EXCEPT LOCAL

This denies access ("-") to everyone except members of the remotees
group ("ALL EXCEPT remotees") trying to access the system through any
means other than sitting down at the console ("ALL EXCEPT LOCAL").

Because of the (IMO) rather clumsy syntax of this file, be aware that
this will not have the intended results in the unlikely event that a
user named "remotees" exists.

--Brad



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux