PythonQ 248-8XX Guide d'installation Page 135

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 294
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 134
Chapter 9. SSH Protocol 135
9.6. Require SSH for Remote Connections
For SSH to be truly effective in protecting your network connections, you must stop using all insecure
connection protocols, such as telnet and rsh. Otherwise, a user’s password may be protected using
ssh for one log in only to be captured when he logs in again using telnet.
To disable insecure connection methods to your system, use the command line program chkcon-
fig, the ncurses-based program ntsysv, or the graphical application Services Configuration Tool
(redhat-config-services). All of these tools require root access.
Some services to disable include:
telnet
rsh
ftp
rlogin
wu-ftpd
vsftpd
For more information on runlevels and configuring services with chkconfig, ntsysv, and Services
Configuration Tool, refer to the chapter titled Controlling Access to Services in the Official Red Hat
Linux Customization Guide.
Vue de la page 134
1 2 ... 130 131 132 133 134 135 136 137 138 139 140 ... 293 294

Commentaires sur ces manuels

Pas de commentaire