From: alexd on
Martin Gregorie wrote:

> alexd wrote:
>
> Thanks for the quick overview.
>
>> SSH is great when you want a quick connection that just works without too
>> much messing about. You can get shell access, copy a few files with scp,
>> etc etc.
> >
> The ssh-based network filing system sounds useful too, though
> I haven't seen it yet.

Well you have, it's call sftp. To be honest, if one can mount a Gmail
account:

http://richard.jones.name/google-hacks/gmail-filesystem/gmail-filesystem.html

then it's probably not outside the bounds of probability that one could
mount an scp or sftp connection, with a similar bit of userspace code. Of
course, you can always tunnel NFS inside SSH:

http://www.math.ualberta.ca/imaging/snfs/


--
<http://ale.cx/> (AIM:troffasky) (gebssnfxl(a)ubgznvy.pbz)
07:55:36 up 12:10, 2 users, load average: 0.39, 0.34, 0.29
This is my BOOOOOOOOOOOOOOOOOOOOOMSTICK

From: usenet on
Chris Croughton <chris(a)keristor.net> wrote:
> On Sun, 15 Jan 2006 10:03:43 +0000, Martin Gregorie
> <martin(a)see.sig.for.address> wrote:
>
> > Both files are described in the ssh and sshd manpages. Sheesh. I think
> > I'm giving out more information than I'm receiving. Doesn't anybody else
> > use ssh over the Internet and if not, why not and what do you use instead?
>
> Yes, I use ssh over the Internet and I don't use that file, because the
> whole point is that I need to be able to get into my machine from places
> where I don't know the IP address (in some cases, via vachines using
> dialup connections where the IP address isn't even the same each time I
> connect). As far as I can see by its nature it only allows connection
> from individual hosts, not even a range, and so is useless to me.
>
What I do is to use a remote ssh account I have as a 'staging post'.
My home machine *only* allows a few known hosts to connect using ssh.
One of these allowed hosts is a machine where I have an ssh login
account, that machine allows ssh access from anywhere. Given that
their security etc. is probably better than mine (it's part of their
job) this seems a reasonable compromise to me.

--
Chris Green

From: usenet on
Martin Gregorie <martin(a)see.sig.for.address> wrote:
> Chris Croughton wrote:
> >
> > Yes, I use ssh over the Internet and I don't use that file, because the
> > whole point is that I need to be able to get into my machine from places
> > where I don't know the IP address (in some cases, via vachines using
> > dialup connections where the IP address isn't even the same each time I
> > connect). As far as I can see by its nature it only allows connection
> > from individual hosts, not even a range, and so is useless to me.
> >
> I quite see your reasoning, and why it would not work for you. Did you
> try wild carding it? The manpages mention this facility, but don't
> explain how a given public key could apply to, say, all the hosts
> implied by *.smith.org or by 111.222.333.* - I see some confusion there!
>
> However, I want to solve the reverse problem and create an exceedingly
> narrow window where only one or two known hosts would be allowed in for
> remote sysadmin and this technique looks as if it matches my requirement.
>
Surely even a fairly simple firewall can be set up to allow only
certain hosts to access your system using specific ports.

--
Chris Green

From: Nix on
On Sun, 15 Jan 2006, Tony van der Hoff wrote:
> Nix <nix-razor-pit(a)esperi.org.uk> wrote in message
> <87mzhxgync.fsf(a)amaterasu.srvr.nix>
>
>> I'd say turn PasswordAuthentication off, too. Stick with key-based
>> authentication only.
>>
> Depends on yhour requirements. Sometimes you can't set keys - I certainly
> wouldn't want to accidentally leave one on a Customer's box.

Make a temporary key and revoke it when you're done.

> Key-based
> authentication PLUS passwords (provided they're strong ones) works fine.

i.e., passphrased keys? Yes, that's fine, but that's not password-
authentication, it's still wholly public key-based :)

>> Jan 15 15:23:17 esperi info: sshd[11806]: Invalid user molly from
> 208.187.226.110
>> Jan 15 15:23:19 esperi info: sshd[11808]: Invalid user molly from
> 208.187.226.110
> [snip]
>
> No, he's not made it into my blocklist - yet.

I was assuming that the IP was from some machine in a botnet, but
perhaps not. I guess if it was botnetted I'd probably see requests from
all over the shop.

> Indeed; they first have to guess a username; then they have to guess a valid
> password :( It's a wonder they achieve anything, and can only be evidence of
> a preponderance of poorly-administered sites out there...

Oh boy yes. `cisco/cisco'... although random English names is a bit of a
sign of desperation, they also tried things like `root',
`administrator', even `postgres', which gave me a second's pause because
I have a user of that name, and they tried it about a second after I'd
sshed to `postgres' on one of my machines...

> Which is why I employ a blocklist script; I enjoy seeing this:
>
> Jan 15 12:09:52 tony-lx sshd[18346]: Failed password for invalid user brd
> from 207.36.86.64 port 49575 ssh2
> Jan 15 12:10:00 tony-lx sshd[18365]: Failed password for invalid user ap
> from 207.36.86.64 port 49762 ssh2
> Jan 15 12:10:01 tony-lx sshd: refused connect from
> 207-36-86-64.ptr.primarydns.com (207.36.86.64)
>
> Zap!

Ah, but if you let them keep battering on a wall they can't get through,
while they're wasting their time with you that's one less
potentially-vulnerable site they can attack. It's a tarpit.

--
`Logic and human nature don't seem to mix very well,
unfortunately.' --- Velvet Wood
From: Nix on
On 15 Jan 2006, John Phillips whispered secretively:
> On 2006-01-15, Nix <nix-razor-pit(a)esperi.org.uk> wrote:
>> The vast majority of attacks on SSH are attacks on bad passwords; I've
>> had some twit trying for most of today and yesterday, four or five
>> requests a second...
>
> I saw a lot of that until I throttled back the allowable connection
> rate with iptables.

What a good idea. I'll have to do that here.

> Probably not much extra security, if any, but they
> generally go away now after a very small number of attempts.

It'll stop them hogging my line (a whole 1.5Kb/s of bandwidth, ooh, I'm
dying; but there's nothing stopping them trying faster, especially once
2.6.16 comes out, with a patch that should double the speed of my
firewall
(<http://user-mode-linux.sourceforge.net/work/current/2.6/2.6.15-rc6/patches/softints>)...)

--
`Logic and human nature don't seem to mix very well,
unfortunately.' --- Velvet Wood
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12
Prev: Network connection
Next: Xauthority lock timeout?