To those who rant "never" - I suggest that the requirements for any 
firewall, and 
whether to allow any protocol including ssh depends on your particular 
circumstances, 
access requirements, data requirements, and degree of trust. 

Let me pose a situation: 
A small business office, or a small satellite office which requires access 
to the internet, 
limited remote user access from the Internet, and of course protection from 
unwanted 
intrusion from the Internet.  Now add in your requrement for remote 
administration (many miles away). 
How else do you implement the situation? Other VPN software? Travel? More 
staff? 
Long distance phone/authenticated modems? More $$? 
SSH is a very useful tool. 

Many also brought up the point that firewalls don't protect against tunnels 
on SSH or any port/protocol. 
For bigger corporate intranet gateways let me ask: Would it mitigate this 
risk (or be possible or practical) 
to set up SSH proxy service at the Internet gateway so that remote users 
use SSH across the 
Internet to a gateway host to authenticate then traverse the DMZ and 
firewall unencrypted so 
that whatever rules, application proxies, and  auditing are implemented are 
performed in full force? 
I have supported similar configurations for Telnet and FTP proxy servers. 
Would this approach expose the SSH key files on the more vulnerable gateway 
host? 

--Dave 

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to