<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH under inetd in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621027#M38718</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I think you should go for your plan. It is save and does not run sshd if it is not needed.&lt;BR /&gt;&lt;BR /&gt;Gideon</description>
    <pubDate>Tue, 27 Nov 2001 21:05:54 GMT</pubDate>
    <dc:creator>G. Vrijhoeven</dc:creator>
    <dc:date>2001-11-27T21:05:54Z</dc:date>
    <item>
      <title>SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621023#M38714</link>
      <description>I am about to start what will problibly a fight here over bringing ssh under inetd.  We are currently running it by itself, with the sshd running all the time.  We are restricting access with /etc/hosts.allow and /etc/hosts.deny (tcpwrappers.)  I want to put ssh in inetd.conf and restrict via /var/adm/inetd.sec  My argument is that inetd is almost ALWAYS available, and the service will be started as needed.  Then we can trust ssh to be there like we have trusted telnet and ftp to be there.  It also makes a single point of management with the inetd.sec file.&lt;BR /&gt;&lt;BR /&gt;My question is this:  Does anyone have a success story or a disaster story to share regarding this?  Any reason not to do this?  I really can't think of one myself.</description>
      <pubDate>Tue, 27 Nov 2001 20:54:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621023#M38714</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2001-11-27T20:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621024#M38715</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;That's a damn good place to put it, because if you needed to shut off network access, you could do it just by stopping inetd, instead of multiple services. Any other justification needed?&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry</description>
      <pubDate>Tue, 27 Nov 2001 20:59:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621024#M38715</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2001-11-27T20:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621025#M38716</link>
      <description>Hello John,&lt;BR /&gt;&lt;BR /&gt;To be honest, I never had my sshd crashing. Anyway, if you have a large number of SSH connections, you may be able to save some startups by leaving the daemon running. If you use SSH sparingly, you can just put it on inetd (however, as I've said, I see no advantage on doing that).&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Paga&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Nov 2001 21:00:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621025#M38716</guid>
      <dc:creator>Marco Paganini</dc:creator>
      <dc:date>2001-11-27T21:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621026#M38717</link>
      <description>John,&lt;BR /&gt;I've been running SSH for about 3 years and have never put it under inetd. Doesn't mean I have a good reason not to. I don't think I have ever had the daemon die, which does not mean it never does.&lt;BR /&gt;&lt;BR /&gt;Also some versions of ssh allow you to control access with the AllowHosts option in the sshd_config file, it works much the same as inetd.conf.&lt;BR /&gt;&lt;BR /&gt;I don't think it matters, do what you think is best for you guys.&lt;BR /&gt;&lt;BR /&gt;Good Luck,&lt;BR /&gt;C</description>
      <pubDate>Tue, 27 Nov 2001 21:05:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621026#M38717</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2001-11-27T21:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621027#M38718</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I think you should go for your plan. It is save and does not run sshd if it is not needed.&lt;BR /&gt;&lt;BR /&gt;Gideon</description>
      <pubDate>Tue, 27 Nov 2001 21:05:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621027#M38718</guid>
      <dc:creator>G. Vrijhoeven</dc:creator>
      <dc:date>2001-11-27T21:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621028#M38719</link>
      <description>I think it makes sense to have it in inetd, so you can take advantage of inetd.sec and only have it running when needed.&lt;BR /&gt;The only reasons I can think of for not using inetd:  SSH was probably not written with the intention of running in inetd in mind, so its possible that you could have some problems. (But I can't think of any at the moment.)  Also, if you have a large number of SSH connections, then it is probably more efficient and quicker to just having the sshd running all the time.  I don't know of too many situations where that would be the case.&lt;BR /&gt;&lt;BR /&gt;I too have never had an issue with sshd failing.  However if its in inetd then you don't have to monitor a separate daemon nor worry about if it does fail.</description>
      <pubDate>Tue, 27 Nov 2001 21:12:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621028#M38719</guid>
      <dc:creator>Bernie Vande Griend</dc:creator>
      <dc:date>2001-11-27T21:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621029#M38720</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;One of the reasons why one wouldn't start sshd through inetd is because it needs to generate the server key everytime it starts through inetd. And this will take time. However it may be ok if smaller key sizes are fine with you.&lt;BR /&gt;&lt;BR /&gt;You need to make sure you add -i option. It tells sshd that it is being invoked by inetd.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Tue, 27 Nov 2001 21:14:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621029#M38720</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2001-11-27T21:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621030#M38721</link>
      <description>I am damn sure my message was not even clear to me.&lt;BR /&gt;&lt;BR /&gt;The reason why sshd is barred running from inetd is because everytime a client connects to it, it needs to generate a key unlike the standalone one that generates it only once and then every hour.&lt;BR /&gt;&lt;BR /&gt;-Sri&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 27 Nov 2001 21:17:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621030#M38721</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2001-11-27T21:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSH under inetd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621031#M38722</link>
      <description>We are talking here about not very many users ever logging in, and never more than a couple at a time.  These machines are A500's or better, I am not really worried about waiting for the key.  (The wait is not really noticable).  Being a University, people are kind of paranoid about security, and I am tired of having two places to manage....</description>
      <pubDate>Tue, 27 Nov 2001 21:31:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ssh-under-inetd/m-p/2621031#M38722</guid>
      <dc:creator>John Payne_2</dc:creator>
      <dc:date>2001-11-27T21:31:12Z</dc:date>
    </item>
  </channel>
</rss>

