--- Gavin McCullagh <[EMAIL PROTECTED]> wrote: 

> 2. SSH's AllowGroups/AllowUsers config
> 
> In /etc/ssh/sshd_config you can add either or both of:
> 
>       AllowGroups admins
>       AllowUsers gavinm johne

I have had a Debian server connected to the Internet for over a year now. It
has still not been compromised I think (touch wood!), but that wasn't for lack
of trying. Almost daily hack attempts on ssh (and http, but that's a different
story), trying a range of machine-generated accounts like root, lpd, apache,
mysql, postgres, and a raft of others. I still have the logs. All of these
allowed unlimited number of login requests, and only rejected the attempts
because the name/password combination wasn't obvious.

As soon as I added 'AllowUsers', would-be users were thrown out even before
they could try different passwords, because they were not on the list of
allowed users. Very much a security-through-obscurity, as the list of allowed
users is not visible from outside and cannot be easily guessed.

The final level of security would be to add a user '[EMAIL PROTECTED]' (yes, 
wildcards
are allowed, my own line reads '[EMAIL PROTECTED]') to AllowUsers: No root
access unless you are already on the internal net and logged in to a skolelinux
server or workstation. No machine-generated accounts available from the outside
at all. And no access from any ltsp clients used by pupils.

> It is generally a good idea to set: 
> 
>       PermitRootLogin no

That would also do it. And you could set additional hurdles on 'tjener', the
main server, so that only a select group of users are allowed to do 'su root'.

My $0.02.

Lars Erlandsen.


=====
Lars G. Erlandsen

Schapiro's Explanation: The grass is always much greener on
the other side -- but that's because they use more manure



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to