Chapter 9. SSH Protocol
135
9.6. Require SSH for Remote Connections
For SSH to be truly effective in protecting your network connections, you must stop using all insecure
connection protocols, such as
telnet
and
rsh
. Otherwise, a user's password may be protected using
ssh
for one log in only to be captured when he logs in again using
telnet
.
To disable insecure connection methods to your system, use the command line program
chkcon 
fig
, the ncurses based program ntsysv, or the graphical application Services Configuration Tool
(
redhat config services
). All of these tools require root access.
Some services to disable include:
  telnet
  rsh
  ftp
  rlogin
  wu ftpd
  vsftpd
For more information on runlevels and configuring services with
chkconfig
, ntsysv, and Services
Configuration Tool, refer to the chapter titled Controlling Access to Services in the Official Red Hat
Linux Customization Guide.






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

tomcat hosting

 

Our partners: PHP: Hypertext Preprocessor Best Web Hosting Java Web Hosting Inexpensive Web Hosting  Jsp Web Hosting

Cheapest Web Hosting Jsp Hosting Cheap Hosting

Visionwebhosting.net Business web hosting division of Web Design Plus. All rights reserved