/dports/security/openssh-portable/openssh-8.8p1/regress/ |
H A D | allow-deny-users.sh | 24 test -z "$allow" || echo AllowUsers="$allow" >> $OBJ/sshd_proxy
|
H A D | README.regress | 138 allow-deny-users.sh: AllowUsers/DenyUsers
|
/dports/textproc/bat/bat-0.18.3/tests/syntax-tests/source/SSHD Config/ |
H A D | sshd_config | 27 AllowUsers alice
|
/dports/security/py-fail2ban/fail2ban-0.11.2/config/filter.d/ |
H A D | bsd-sshd.conf | 32 ^%(__prefix_line)sUser \S+ from <HOST> not allowed because not listed in AllowUsers$
|
H A D | sshd.conf | 47 … ^User <F-USER>\S+|.*?</F-USER> from <HOST> not allowed because not listed in AllowUsers%(__suff)s$
|
/dports/www/gitea/gitea-1.16.5/docker/root/etc/templates/ |
H A D | sshd_config | 38 AllowUsers ${USER}
|
/dports/textproc/augeas/augeas-1.12.0/lenses/ |
H A D | sshd.aug | 96 let allow_users = array_entry /AllowUsers/i "AllowUsers"
|
/dports/net-im/tdlib/td-a53cb30e99f937cfd64e0266fa558785a184a553/td/telegram/ |
H A D | PrivacyManager.cpp | 184 type_ = Type::AllowUsers; in UserPrivacySettingRule() 220 type_ = Type::AllowUsers; in UserPrivacySettingRule() 253 case Type::AllowUsers: in get_user_privacy_setting_rule_object() 276 case Type::AllowUsers: in get_input_privacy_rule()
|
H A D | PrivacyManager.h | 93 AllowUsers, enumerator
|
/dports/security/py-fail2ban/fail2ban-0.11.2/fail2ban/tests/config/filter.d/ |
H A D | zzz-sshd-obsolete-multiline.conf | 43 …^%(__prefix_line_sl)sUser .+ from <HOST> not allowed because not listed in AllowUsers\s*%(__suff)s$
|
/dports/sysutils/logwatch/logwatch-7.5.1/scripts/services/ |
H A D | sshd | 62 my %AllowUsers = (); 301 …er) = ($ThisLine =~ /^User ([^ ]*) from (?:[^ ]*) not allowed because not listed in AllowUsers/)) { 302 $AllowUsers{$User}++; 551 if (keys %AllowUsers) { 552 print "\nLogin attempted when not in AllowUsers list:\n"; 553 foreach my $User (sort {$a cmp $b} keys %AllowUsers) { 554 print " $User : " . timesplural($AllowUsers{$User});
|
/dports/sysutils/p5-BSD-Process/BSD-Process-0.07/ |
H A D | README | 66 addresses (which would allow you to set up an AllowUsers USER@HOST
|
/dports/devel/gitolite2/gitolite-2.3.1/t/ |
H A D | README-t.mkd | 36 (Out of scope for this document: sshd config, 'AllowUsers', etc...)
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | sshd_config.0 | 50 order: DenyUsers, AllowUsers, DenyGroups, and finally 65 AllowUsers 74 AllowUsers, DenyGroups, and finally AllowGroups. 258 DenyUsers, AllowUsers, DenyGroups, and finally AllowGroups. 271 AllowUsers, DenyGroups, and finally AllowGroups. 491 AllowUsers, AuthenticationMethods, AuthorizedKeysCommand,
|
H A D | sshd.0 | 146 using a USER@HOST pattern in AllowUsers or DenyUsers.
|
/dports/security/py-fail2ban/fail2ban-0.11.2/fail2ban/tests/files/logs/ |
H A D | sshd | 40 Mar 3 00:17:22 [sshd]: User root from 211.188.220.49 not allowed because not listed in AllowUsers 42 …14:34:11 belka sshd[31607]: User root from example.com not allowed because not listed in AllowUsers 93 Jun 25 23:53:34 [sshd] User root from 1.2.3.4 not allowed because not listed in AllowUsers
|
H A D | sshd-journal | 43 srv sshd[31605]: User root from 211.188.220.49 not allowed because not listed in AllowUsers 45 srv sshd[31607]: User root from example.com not allowed because not listed in AllowUsers
|
/dports/sysutils/p5-BSD-Sysctl/BSD-Sysctl-0.12.2/ |
H A D | README | 89 address (which would allow you to set up an AllowUsers USER@HOST
|
/dports/editors/neovim/neovim-0.6.1/runtime/syntax/ |
H A D | sshdconfig.vim | 163 syn keyword sshdconfigKeyword AllowUsers
|
/dports/editors/vim/vim-8.2.3745/runtime/syntax/ |
H A D | sshdconfig.vim | 163 syn keyword sshdconfigKeyword AllowUsers
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | sshd_config.0 | 72 AllowUsers 82 processed in the following order: DenyUsers, AllowUsers. 335 following order: DenyUsers, AllowUsers. 706 AllowTcpForwarding, AllowUsers, AuthenticationMethods,
|
H A D | sshd.0 | 123 that require DNS include using a USER@HOST pattern in AllowUsers
|
/dports/devel/gitolite2/gitolite-2.3.1/doc/ |
H A D | ssh-troubleshooting.mkd | 280 `AllowUsers` config entry, then only users mentioned in that line are
|
/dports/security/lynis/lynis/db/ |
H A D | tests.db | 406 SSH-7440:test:security:ssh::AllowUsers and AllowGroups:
|
/dports/security/lynis/lynis/ |
H A D | CHANGELOG.md | 2718 - SSH AllowUsers and AllowGroups usage check [SSH-7440]
|