Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 30 Mar 2002 11:36:20 -0400
From:      "N. J. Cash" <ncash@pei.eastlink.ca>
To:        "Fernando Gleiser" <fgleiser@cactus.fi.uba.ar>, "Jesper Wallin" <z3l3zt@phucking.kicks-ass.org>
Cc:        <security@FreeBSD.ORG>
Subject:   Re: SSH or Telnet?
Message-ID:  <004101c1d800$a4a71ee0$6401a8c0@router.unknown.ca>
References:  <20020328201100.E6672-100000@cactus.fi.uba.ar>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
I would also recomend that you restrict access to ssh using /etc/hosts.allow if you would like some added security to just who all can ssh to your box.

Also, if you're going with ssh *which you should* I would only enable protocol 2 and restrict user access to ssh using /etc/ssh/sshd_config as well.

AllowUsers user1 user2 user3 etc...
DenyUsers root nobody etc...

At least if you're really parioned about sshd those steps will let you sleep a little better at night! : )



N. J. Cash
ncash@pei.eastlink.ca
  ----- Original Message ----- 
  From: Fernando Gleiser 
  To: Jesper Wallin 
  Cc: security@FreeBSD.ORG 
  Sent: Thursday, March 28, 2002 7:42 PM
  Subject: Re: SSH or Telnet?


  On Thu, 28 Mar 2002, Jesper Wallin wrote:

  > Hey!
  >
  >
  > I've heard and seen alot of security problems related to SSH (OpenSSH) and
  > many of my friends have been playing with alot of 0day exploits for it..
  > Right now I'm running the latest port version of it on a non-standard port
  > and hope to be secured with it.. I don't accualy see the reason to not use
  > Telnet.. All  I know tells me it's old and recommend me running OpenSSH
  > instead..

  Telnet also had some remote root vulnerabities.
  Every program has bugs. You need to keep them up to date and apply all the
  security fixes.

  Also, having sshd runing in a non standard port doesn't buy you much.
  There are scanners which try to verify which service is which port and
  they will find out it's ssh even if it is listening in port 31337. =0)

  >
  > What is the best solution? Ofcause peoples are able to attack me with
  > brute-force attacks and it's not encrypted.. well, all the peoples who've
  > shell/ssh access are trusted and I think they know what they do..

  The people may be trusted, but are you sure you can trust the networks they are
  loging in from?

  Besides sniffing, ssh protects you against other threats:

  1. ssh has some protection against IP spoofing.
  2. ssh has stronger authentication methods.
  3. ssh protects you against session hijacking.
  4. ssh lets you authenticate the server to the client.
  5. ssh lets you tunnel an insecure protocol (POP, IMAP) through an encrypted
     connection

  You can use an SSL enabled telnet or IPSec for the first four, but I find
  ssh easier to set up if all you need is remote login/shell/file transfer.





  Fer
  >
  >
  > Anyone have any idea/suggestion?
  >
  > //Jesper aka Z3l3zT
  >
  >
  >
  > To Unsubscribe: send mail to majordomo@FreeBSD.org
  > with "unsubscribe freebsd-security" in the body of the message
  >


  To Unsubscribe: send mail to majordomo@FreeBSD.org
  with "unsubscribe freebsd-security" in the body of the message


[-- Attachment #2 --]
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.2713.1100" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face="Lucida Sans Unicode" size=2>I would also recomend that 
you&nbsp;restrict access to ssh using /etc/hosts.allow if you would like some 
added security to just who all can ssh to your box.</FONT></DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2></FONT>&nbsp;</DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2>Also, if you're going with ssh 
*which you should* I would only enable protocol 2 and restrict user access to 
ssh using /etc/ssh/sshd_config as well.</FONT></DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2></FONT>&nbsp;</DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2>AllowUsers user1 user2 user3 
etc...<BR>DenyUsers root nobody etc...</FONT></DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2></FONT>&nbsp;</DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2>At least if you're really parioned 
about sshd those steps will let you sleep a little better at night! : 
)</FONT></DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2></FONT>&nbsp;</DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2></FONT>&nbsp;</DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2></FONT>&nbsp;</DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2>N. J. Cash</FONT></DIV>
<DIV><FONT face="Lucida Sans Unicode" size=2><A 
href="mailto:ncash@pei.eastlink.ca">ncash@pei.eastlink.ca</A></FONT></DIV>
<BLOCKQUOTE 
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
  <DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
  <DIV 
  style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B> 
  <A title=fgleiser@cactus.fi.uba.ar 
  href="mailto:fgleiser@cactus.fi.uba.ar">Fernando Gleiser</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>To:</B> <A 
  title=z3l3zt@phucking.kicks-ass.org 
  href="mailto:z3l3zt@phucking.kicks-ass.org">Jesper Wallin</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Cc:</B> <A title=security@FreeBSD.ORG 
  href="mailto:security@FreeBSD.ORG">security@FreeBSD.ORG</A> </DIV>
  <DIV style="FONT: 10pt arial"><B>Sent:</B> Thursday, March 28, 2002 7:42 
  PM</DIV>
  <DIV style="FONT: 10pt arial"><B>Subject:</B> Re: SSH or Telnet?</DIV>
  <DIV><BR></DIV>On Thu, 28 Mar 2002, Jesper Wallin wrote:<BR><BR>&gt; 
  Hey!<BR>&gt;<BR>&gt;<BR>&gt; I've heard and seen alot of security problems 
  related to SSH (OpenSSH) and<BR>&gt; many of my friends have been playing with 
  alot of 0day exploits for it..<BR>&gt; Right now I'm running the latest port 
  version of it on a non-standard port<BR>&gt; and hope to be secured with it.. 
  I don't accualy see the reason to not use<BR>&gt; Telnet.. All&nbsp; I know 
  tells me it's old and recommend me running OpenSSH<BR>&gt; 
  instead..<BR><BR>Telnet also had some remote root vulnerabities.<BR>Every 
  program has bugs. You need to keep them up to date and apply all 
  the<BR>security fixes.<BR><BR>Also, having sshd runing in a non standard port 
  doesn't buy you much.<BR>There are scanners which try to verify which service 
  is which port and<BR>they will find out it's ssh even if it is listening in 
  port 31337. =0)<BR><BR>&gt;<BR>&gt; What is the best solution? Ofcause peoples 
  are able to attack me with<BR>&gt; brute-force attacks and it's not 
  encrypted.. well, all the peoples who've<BR>&gt; shell/ssh access are trusted 
  and I think they know what they do..<BR><BR>The people may be trusted, but are 
  you sure you can trust the networks they are<BR>loging in from?<BR><BR>Besides 
  sniffing, ssh protects you against other threats:<BR><BR>1. ssh has some 
  protection against IP spoofing.<BR>2. ssh has stronger authentication 
  methods.<BR>3. ssh protects you against session hijacking.<BR>4. ssh lets you 
  authenticate the server to the client.<BR>5. ssh lets you tunnel an insecure 
  protocol (POP, IMAP) through an encrypted<BR>&nbsp;&nbsp; 
  connection<BR><BR>You can use an SSL enabled telnet or IPSec for the first 
  four, but I find<BR>ssh easier to set up if all you need is remote 
  login/shell/file transfer.<BR><BR><BR><BR><BR><BR>Fer<BR>&gt;<BR>&gt;<BR>&gt; 
  Anyone have any idea/suggestion?<BR>&gt;<BR>&gt; //Jesper aka 
  Z3l3zT<BR>&gt;<BR>&gt;<BR>&gt;<BR>&gt; To Unsubscribe: send mail to <A 
  href="mailto:majordomo@FreeBSD.org">majordomo@FreeBSD.org</A><BR>&gt; with 
  "unsubscribe freebsd-security" in the body of the 
  message<BR>&gt;<BR><BR><BR>To Unsubscribe: send mail to <A 
  href="mailto:majordomo@FreeBSD.org">majordomo@FreeBSD.org</A><BR>with 
  "unsubscribe freebsd-security" in the body of the 
message<BR></BLOCKQUOTE></BODY></HTML>

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?004101c1d800$a4a71ee0$6401a8c0>