From: David Brown on
On 18/06/2010 12:29, unruh wrote:
> On 2010-06-17, David Brown<david(a)westcontrol.removethisbit.com> wrote:
>> On 17/06/2010 11:12, Todd wrote:
>>> Hi All,
>>>
>>> With this command:
>>>
>>> ssh -l todd -X 192.168.255.14 /usr/bin/VirtualBox
>>>
>>> I can run VirtualBox console on another computer with X11.
>>> All I get is asked for my password.
>>>
>>> I don't get it. How is this any more secure that plain
>>> old telnet? Both are just a user name and password.
>>> You could hack it the same old way other services
>>> are hacked by running the dictionary at them. I
>>> do believe OPH Crack over on the Windows side calls
>>> this "Rainbow tables".
>
> A dictionary attack on passwords is difficult if you choose reasonable
> passwords Ie, greater than 8 letters, and proper password choice. If you
> use "a" as your password, they yes, password guessing it easy.
> Also ssh enrypts all data, includeing password exchange.
>

I like to put iptables connection limits on the ssh port - say, 3 per
minute with a burst of 3. That will stop any dictionary attacks (unless
your password is in the top few favourite passwords list).
Theoretically this could give you a DOS, but in practice the attacker
will give up quickly.

>>>
>>> I ask this because I will be needing to open SSH (port 22)
>>> for a vendor to get in on. And, well, I just don't get
>>> the advantage of ssh over anything else.
>
> Think about it.
>
>>>
>>
>> Arrange with the vendor to use a non-standard port. If you open port 22
>> to the world, you'll get lots of unwanted attempts at breaking in. If
>> you put your ssh server on port 12345, it will be free from attacks.
>
> No. But it might make it more difficult. If you have a specific enemy (
> rather than someone in Ulan Battor trying stuff on your random machine)
> then weird ports will be of no help.
>

A non-standard port won't stop a knowledgeable and determined attacker -
but if you are expecting that sort of thing, you are in a different
class for security requirements. The non-standard port will stop all
drive-bys and script kiddies - no one is going to scan for open ports in
this range. For extra protection, add port knocking on port 22 and
various other unused ports that trigger a block on the source ip.

>>
>>> What am I missing? Is there a way to tighten ssh up?
>
> Use decent passwords.

From: unruh on
On 2010-06-18, Maxwell Lol <nospam(a)com.invalid> wrote:
> unruh <unruh(a)wormhole.physics.ubc.ca> writes:
>
>> A dictionary attack on passwords is difficult if you choose reasonable
>> passwords Ie, greater than 8 letters, and proper password choice. If you
>> use "a" as your password, they yes, password guessing it easy.
>> Also ssh enrypts all data, includeing password exchange.
>
> Well, if the application was dumb, and allowed unlimited guessing,
> then brute force password cracking can succeed even if a hard-to-guess
> password is chosen.
>

Depends on how long you try. Most people are not interested in taking
10000 centuries to crack an ssh session. So, let us put a time limit of
1 year. And a hard to guess pasword WILL give you one year.

(and remember that most people are not interested even in 1 year.)

From: jellybean stonerfish on
On Thu, 17 Jun 2010 14:20:41 +0000, J G Miller wrote:

> On Thu, 17 Jun 2010 13:44:39 +0000, General Schvantzkoph wrote:
>> I require RSA authentication and I use denyhosts, but I also keep my
>> pants up with both a belt and suspenders (that's for real, it's not
>> just an expression).
>
> I really do not understand people's reaction to too much security being
> overkill ie a bad thing.
>
> Too much security never hurt, as compared to too little.

Encrypting everything to the point of insanity is expensive.
From: Todd on

> Also you should never use passwords on ssh, you should require RSA
> authentication. In /etc/sshd_config
>
> RSAAuthentication yes
> PubkeyAuthentication yes
> PasswordAuthentication no
>
> To allow access to an account you put the user's public key in
> ~/.ssh/authorized_keys


Now is makes sense. Thank you.

-T
From: General Schvantzkoph on
On Fri, 18 Jun 2010 19:50:26 -0700, Todd wrote:

>> Also you should never use passwords on ssh, you should require RSA
>> authentication. In /etc/sshd_config
>>
>> RSAAuthentication yes
>> PubkeyAuthentication yes
>> PasswordAuthentication no
>>
>> To allow access to an account you put the user's public key in
>> ~/.ssh/authorized_keys
>
>
> Now is makes sense. Thank you.
>
> -T

The easiest way to manage ssh is to use webmin,

http://www.webmin.com

Webmin is a browser based admin tool that works on most Linux distros,
you just have to point your browser at https://machinename:10000. The
ssh module is under Servers/SSH Server, it will allow you to configure
all of SSH's options.