From owner-freebsd-security@FreeBSD.ORG Thu Sep 22 16:10:03 2005 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id DA51716A41F for ; Thu, 22 Sep 2005 16:10:03 +0000 (GMT) (envelope-from tataz@tataz.chchile.org) Received: from smtp3-g19.free.fr (smtp3-g19.free.fr [212.27.42.29]) by mx1.FreeBSD.org (Postfix) with ESMTP id 8333D43D49 for ; Thu, 22 Sep 2005 16:10:03 +0000 (GMT) (envelope-from tataz@tataz.chchile.org) Received: from tatooine.tataz.chchile.org (vol75-8-82-233-239-98.fbx.proxad.net [82.233.239.98]) by smtp3-g19.free.fr (Postfix) with ESMTP id 96BCE2507E; Thu, 22 Sep 2005 18:10:02 +0200 (CEST) Received: by tatooine.tataz.chchile.org (Postfix, from userid 1000) id C6A83405D; Thu, 22 Sep 2005 18:09:59 +0200 (CEST) Date: Thu, 22 Sep 2005 18:09:59 +0200 From: Jeremie Le Hen To: markzero Message-ID: <20050922160959.GQ24643@obiwan.tataz.chchile.org> References: <20050922152718.GB91509@logik.internal.network> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20050922152718.GB91509@logik.internal.network> User-Agent: Mutt/1.5.10i Cc: freebsd-security@freebsd.org Subject: Re: Tunnel-only SSH keys X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 Sep 2005 16:10:04 -0000 Hi, > I once read somewhere that it's possible to limit SSH pubkeys to > 'tunnel-only'. I can't seem to find any information about this > in any of the usual places. > > I'm going to be deploying a few servers in a couple of days and > I'd like them to log to a central server over an SSH tunnel (using > syslog-ng) however I'd like to prevent actual logins (hence > 'tunnel-only'). > > Can this be done with OpenSSH? I'd like to try and stay away from > the complexities of a chrooted-stunnel for now... I think you can use /bin/false as shell, and then use ``ssh -nN'' from the client. I've not tested this, but I guess this should work. Regards, -- Jeremie Le Hen < jeremie at le-hen dot org >< ttz at chchile dot org >