Home
last modified time | relevance | path

Searched refs:AllowUsers (Results 1 – 25 of 28) sorted by relevance

12

/dports/security/openssh-portable/openssh-8.8p1/regress/
H A Dallow-deny-users.sh24 test -z "$allow" || echo AllowUsers="$allow" >> $OBJ/sshd_proxy
H A DREADME.regress138 allow-deny-users.sh: AllowUsers/DenyUsers
/dports/textproc/bat/bat-0.18.3/tests/syntax-tests/source/SSHD Config/
H A Dsshd_config27 AllowUsers alice
/dports/security/py-fail2ban/fail2ban-0.11.2/config/filter.d/
H A Dbsd-sshd.conf32 ^%(__prefix_line)sUser \S+ from <HOST> not allowed because not listed in AllowUsers$
H A Dsshd.conf47 … ^User <F-USER>\S+|.*?</F-USER> from <HOST> not allowed because not listed in AllowUsers%(__suff)s$
/dports/www/gitea/gitea-1.16.5/docker/root/etc/templates/
H A Dsshd_config38 AllowUsers ${USER}
/dports/textproc/augeas/augeas-1.12.0/lenses/
H A Dsshd.aug96 let allow_users = array_entry /AllowUsers/i "AllowUsers"
/dports/net-im/tdlib/td-a53cb30e99f937cfd64e0266fa558785a184a553/td/telegram/
H A DPrivacyManager.cpp184 type_ = Type::AllowUsers; in UserPrivacySettingRule()
220 type_ = Type::AllowUsers; in UserPrivacySettingRule()
253 case Type::AllowUsers: in get_user_privacy_setting_rule_object()
276 case Type::AllowUsers: in get_input_privacy_rule()
H A DPrivacyManager.h93 AllowUsers, enumerator
/dports/security/py-fail2ban/fail2ban-0.11.2/fail2ban/tests/config/filter.d/
H A Dzzz-sshd-obsolete-multiline.conf43 …^%(__prefix_line_sl)sUser .+ from <HOST> not allowed because not listed in AllowUsers\s*%(__suff)s$
/dports/sysutils/logwatch/logwatch-7.5.1/scripts/services/
H A Dsshd62 my %AllowUsers = ();
301 …er) = ($ThisLine =~ /^User ([^ ]*) from (?:[^ ]*) not allowed because not listed in AllowUsers/)) {
302 $AllowUsers{$User}++;
551 if (keys %AllowUsers) {
552 print "\nLogin attempted when not in AllowUsers list:\n";
553 foreach my $User (sort {$a cmp $b} keys %AllowUsers) {
554 print " $User : " . timesplural($AllowUsers{$User});
/dports/sysutils/p5-BSD-Process/BSD-Process-0.07/
H A DREADME66 addresses (which would allow you to set up an AllowUsers USER@HOST
/dports/devel/gitolite2/gitolite-2.3.1/t/
H A DREADME-t.mkd36 (Out of scope for this document: sshd config, 'AllowUsers', etc...)
/dports/security/gnome-ssh-askpass/openssh-6.6p1/
H A Dsshd_config.050 order: DenyUsers, AllowUsers, DenyGroups, and finally
65 AllowUsers
74 AllowUsers, DenyGroups, and finally AllowGroups.
258 DenyUsers, AllowUsers, DenyGroups, and finally AllowGroups.
271 AllowUsers, DenyGroups, and finally AllowGroups.
491 AllowUsers, AuthenticationMethods, AuthorizedKeysCommand,
H A Dsshd.0146 using a USER@HOST pattern in AllowUsers or DenyUsers.
/dports/security/py-fail2ban/fail2ban-0.11.2/fail2ban/tests/files/logs/
H A Dsshd40 Mar 3 00:17:22 [sshd]: User root from 211.188.220.49 not allowed because not listed in AllowUsers
42 …14:34:11 belka sshd[31607]: User root from example.com not allowed because not listed in AllowUsers
93 Jun 25 23:53:34 [sshd] User root from 1.2.3.4 not allowed because not listed in AllowUsers
H A Dsshd-journal43 srv sshd[31605]: User root from 211.188.220.49 not allowed because not listed in AllowUsers
45 srv sshd[31607]: User root from example.com not allowed because not listed in AllowUsers
/dports/sysutils/p5-BSD-Sysctl/BSD-Sysctl-0.12.2/
H A DREADME89 address (which would allow you to set up an AllowUsers USER@HOST
/dports/editors/neovim/neovim-0.6.1/runtime/syntax/
H A Dsshdconfig.vim163 syn keyword sshdconfigKeyword AllowUsers
/dports/editors/vim/vim-8.2.3745/runtime/syntax/
H A Dsshdconfig.vim163 syn keyword sshdconfigKeyword AllowUsers
/dports/security/openssh-portable/openssh-8.8p1/
H A Dsshd_config.072 AllowUsers
82 processed in the following order: DenyUsers, AllowUsers.
335 following order: DenyUsers, AllowUsers.
706 AllowTcpForwarding, AllowUsers, AuthenticationMethods,
H A Dsshd.0123 that require DNS include using a USER@HOST pattern in AllowUsers
/dports/devel/gitolite2/gitolite-2.3.1/doc/
H A Dssh-troubleshooting.mkd280 `AllowUsers` config entry, then only users mentioned in that line are
/dports/security/lynis/lynis/db/
H A Dtests.db406 SSH-7440:test:security:ssh::AllowUsers and AllowGroups:
/dports/security/lynis/lynis/
H A DCHANGELOG.md2718 - SSH AllowUsers and AllowGroups usage check [SSH-7440]

12