{"url":"https://hogem.hatenablog.com/entry/20130108/1357651943","image_url":null,"title":"sshd_config AllowUsers\u306buser@host \u3092\u66f8\u3044\u3066\u30e6\u30fc\u30b6\u3054\u3068\u306b\u30ed\u30b0\u30a4\u30f3\u5143IP\u3092\u5236\u9650\u3059\u308b","categories":["linux","ssh"],"author_name":"hogem","author_url":"https://blog.hatena.ne.jp/hogem/","blog_url":"https://hogem.hatenablog.com/","description":"\u3053\u308c\u51fa\u6765\u308b\u306e\u77e5\u3089\u306a\u304b\u3063\u305f\u3002(IP\u5236\u9650\u306ffirewall, iptables, tcp wrapper(/etc/hosts.allow) \u3067\u3082\u3059\u308b\u3051\u3069) man sshd_config \u306b\u30ac\u30c3\u30c4\u30ea\u66f8\u304b\u308c\u3066\u307e\u3059\u306d\u3002 AllowUsers (snip) If the pattern takes the form USER@HOST then USER and HOST are separately checked, restricting logins to particular users from particular hosts. The allow/deny directives are \u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fhogem.hatenablog.com%2Fentry%2F20130108%2F1357651943\" title=\"sshd_config AllowUsers\u306buser@host \u3092\u66f8\u3044\u3066\u30e6\u30fc\u30b6\u3054\u3068\u306b\u30ed\u30b0\u30a4\u30f3\u5143IP\u3092\u5236\u9650\u3059\u308b - \u3046\u307e\u3044\u307c\u3046\u3076\u308d\u3050\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","version":"1.0","provider_name":"Hatena Blog","provider_url":"https://hatena.blog","width":"100%","height":"190","type":"rich","blog_title":"\u3046\u307e\u3044\u307c\u3046\u3076\u308d\u3050","published":"2013-01-08 22:32:23"}