From: Keith Keller on
On 2010-06-17, The Natural Philosopher <tnp(a)invalid.invalid> wrote:
> F. Michael Orr wrote:
>
>> If one were serious
>> about compromising an organization, then all one would have to do would
>> be to set up a man in the middle router, which would silently capture all
>> traffic to/from a site. If this traffic were not encrypted, this would
>> be a problem.
>
> All? that's already a very very hard thing to do with most routers.
>
> And not something to be done without ISPs explicit knowledge and consent.

Exactly--it's relatively straightforward to simply compromise someone on
the inside, who you then get to dump the traffic for you. Do you trust
all the people who work at every ISP between you and your ssh server?

Why are you so opposed to ssh when it's barely any more overhead than
telnet, and has many more features? You mentioned the hammer-nail
analogy in another post, but I'd counter that ssh is not a hammer, but a
swiss army knife--it does a lot of small tasks in a very handy way.

--keith

--
kkeller-usenet(a)wombat.san-francisco.ca.us
(try just my userid to email me)
AOLSFAQ=http://www.therockgarden.ca/aolsfaq.txt
see X- headers for PGP signature information

From: Keith Keller on
On 2010-06-17, Kenny McCormack <gazelle(a)shell.xmission.com> wrote:
>
> You might want to check out a recent White Paper which argues to the
> contrary. I don't have the URL handy, but Google for things like:
> "Is Security worth it?", "White Paper", "Microsoft" (Yes, it was written
> and published by MS - feel free to do the usual Unix-rant thereto).

"So Long, and No Thanks for the Externalities: The Rational Rejection of
Security Advice by Users", by Cormac Herley

A link to the paper is at his MS site:

http://research.microsoft.com/en-us/people/cormac/

It's an interesting paper, but it's a little light in the mathematics.

--keith

--
kkeller-usenet(a)wombat.san-francisco.ca.us
(try just my userid to email me)
AOLSFAQ=http://www.therockgarden.ca/aolsfaq.txt
see X- headers for PGP signature information

From: David Brown on
J G Miller wrote:
> On Thu, 17 Jun 2010 15:55:42 +0200, David Brown wrote:
>
>> The iptables rules control the incoming traffic, and
>> limit it to a particular source address if you want. Why would you
>> bother repeating the same rules again?
>
> If the filtering for outside traffic is done at the router,
> then you may not want to allow all hosts by default inside
> the network to ssh into that machine.
>

I was assuming the iptables rules were on the same machine as the ssh
server. If not, and if you see other machines on the same net as a
risk, then yes it makes sense to limit access to the ssh server by ip
address. Whether you do that by a local iptables rule or a hosts.allow
rule is a matter of taste.

> The best security model is not one where everything is open
> and then you lockdown the undesirables, but the other way
> around where everything is locked down and then only open up
> those things which you wish to allow.
>

True enough. And it's also important to have layers of security at
different levels. I was objecting to what I saw as duplications - the
same security control in two different ways at two different places,
which won't block any more attacks but will still mean twice the
maintenance and twice the troubleshooting when something goes wrong.

>> A vpn doesn't add anything in security over the
>> ssh connection.
>
> Two points
>
> 1) with VPN you have the VPN port open rather than the ssh
> port which will of course stop ssh drive by attempts.
>

You stop ssh drive-by's by using a non-standard port if you can.
Connection rate limiting is also very useful.

> 2) with VPN you can revoke a certificate thereby stopping
> further access from the user with that certificate
>

And with ssh you can change the user's password or delete their public key.

A vpn can certainly add convenience - I just don't think it adds
security. When I want to access the company servers from my home
network, I have two paths. I can ssh into a relay machine, and ssh on
from there to the target machine (perhaps using port forwarding). Or I
can connect my vpn and then ssh directly to the targets. I don't think
the second method is more secure, but it is a step less if I am wanting
to connect to several servers.

>> Use public/private key access (perhaps also with
>> passwords) for the ssh access if you want.
>
> I completely agree that ssh with keys exchange only
> as the means of authentication is the best use of
> ssh and in general provides adequate security
> even over the Internet.
From: AZ Nomad on
On Thu, 17 Jun 2010 23:35:52 +0100, The Natural Philosopher <tnp(a)invalid.invalid> wrote:
>AZ Nomad wrote:
>> On Thu, 17 Jun 2010 02:12:25 -0700, Todd <todd(a)invalid.com> wrote:
>>> Hi All,
>>
>>> With this command:
>>
>>> ssh -l todd -X 192.168.255.14 /usr/bin/VirtualBox
>>
>>> I can run VirtualBox console on another computer with X11.
>>> All I get is asked for my password.
>>
>>> I don't get it. How is this any more secure that plain
>>> old telnet? Both are just a user name and password.
>>
>> With telnet, anybody watching packets going over our network can see
>> your password in the clear.
>>

>That's precisely nobody in any modern network.

bullshit.
From: Keith Keller on
On 2010-06-17, The Natural Philosopher <tnp(a)invalid.invalid> wrote:
> Keith Keller wrote:
>>
>> Exactly--it's relatively straightforward to simply compromise someone on
>> the inside, who you then get to dump the traffic for you.
>
> You have to be joking.
>
> Its got to be worth more than the rest of their IT career for a start.

That's about money, not about ease. If you have enough money (which
might be less than you think) it's not difficult to find someone who can
be bought.

(yes, it was a bit of a joke, but the point still stands, that people
are the weak link in almost any security situation)

>> Why are you so opposed to ssh when it's barely any more overhead than
>> telnet, and has many more features? You mentioned the hammer-nail
>> analogy in another post, but I'd counter that ssh is not a hammer, but a
>> swiss army knife--it does a lot of small tasks in a very handy way.
>
> I'm not opposed tpo it, I am opposed to the stupidity of people who
> think it makes any difference to anything in the real world.

So what if it does or not? The additional overhead above telnet is
minimal. It's not like you're asking users to carry an OTP card, which
would create a lot more work for them. The amount of effort to use ssh
(with password) and telnet is the same, so why not use the one that's
more secure (even if just barely)?

> Clearly they have no clue about REAL security, but are just [parroting
> technobabble for the sake of it.

''Real'' security is taking whatever measures one deems reasonable. It
certainly does not seem reasonable to me to recommend telnet over ssh in
99% of situations where you need some sort of shell access to a remote
host over IP. Even a 486 or the various consumer wifi routers have
enough CPU to do ssh encryption fairly easily. (I do have some APC PDUs
where ssh actually is painfully slow, so I might see telnet as a better
alternative there, as one example.)

--keith

--
kkeller-usenet(a)wombat.san-francisco.ca.us
(try just my userid to email me)
AOLSFAQ=http://www.therockgarden.ca/aolsfaq.txt
see X- headers for PGP signature information