On Tue, 24 Apr 2007 01:33:10 +0200
Joachim Schipper <[EMAIL PROTECTED]> wrote:

> On Tue, Apr 24, 2007 at 12:48:46AM +0200, Rico Secada wrote:
> > On Tue, 24 Apr 2007 00:05:51 +0200
> > Joachim Schipper <[EMAIL PROTECTED]> wrote:
> > 
> > > On Mon, Apr 23, 2007 at 09:28:53PM +0200, Rico Secada wrote:
> > > > Hi 
> > > > 
> > > > I need some comments from you guys on using sshfs as a solution at
> > > > work. 
> > > > 
> > > > I need to make some of our NFS servers available for employees at
> > > > their homes (where they live). I have been looking at both IPSec
> > > > together with VPN, but I really like SSH better. At debian mailinglist
> > > > I got a suggestion about using sshfs and nothing else, I really love
> > > > SSH, but are a bit worried about users being able to ssh in. With
> > > > sshfs the workers can mount their home directories like with nfs.
> > > > 
> > > > If userlands are setup chmod 700, and each user are in no groups but
> > > > themselves, does this pose a security risk? 
> > > 
> > > This is a public mailing list. Trim your message at 72 columns.
> > 
> > Meaning?
> 
> Messages should look like:
> 
> Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod
> tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim
> veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea
> commodo consequat. Duis aute irure dolor in reprehenderit in voluptate
> velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint
> occaecat cupidatat non proident, sunt in culpa qui officia deserunt
> mollit anim id est laborum.
> 123456789012345678901234567890123456789012345678901234567890123456789012
> 
> Not like:
> 
> Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod 
> tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, 
> quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo 
> consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse 
> cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non 
> proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

I already answered someone who also commented on this. I am not being 
rude, but why is that important? 

> > > > [demime 1.01d removed an attachment of type application/pgp-signature 
> > > > which had a name of signature.asc]
> > > 
> > > mail.html specifically states not to do this, and posting them as an
> > > attachment is particularly useless.
> > 
> > I have got no idea what this is about. I havent made any attachments.
> 
> Yes, you have: a new-style PGP signature is an attachment.

I didn't know that, thank you for making me aware :-)
 
> > > However, I presume you came here looking for advice that actually
> > > pertains to your question.
> > > 
> > > sshfs uses FUSE, which is at the moment Linux-only. It's also an
> > > interesting, but rather scary, contraption. Getting it installed might
> > > not be easy. (I say 'might' because I've never tried it; for all I know,
> > > all major distributions have a package and compile the relevant part
> > > into their stock kernels. Does anybody have more information?)
> > 
> > Using OpenBSD as a server works perfectly. The server needs nothing
> > more than SSH. About the client I have succesfully setup Debian with
> > fuse and it works perfectly with OpenBSD serving. I also know that
> > FreeBSD has a port for client installation. Fuse uses the sftp part of
> > SSH. On Debian all it takes is installing the package and using
> > modprobe. On FreeBSD it should be almost as easy and quick.
> 
> Okay, so there's a FreeBSD port now. Cool.
> 
> Still, you can't access it from OpenBSD. I was just wondering if that is
> a problem.

In our case no clients are gonna run OpenBSD, only the servers will run 
OpenBSD.

> > > If the goal is to use SSH, you might want to take a look at ssh -w; I
> > > believe that will work for you, but read the docs first. As an
> > > alternative, consider switching to something with fixed port
> > > allocations (CIFS/SAMBA, AFS) and port forwarding.
> > > 
> > > Finally, if confidentiality does not matter, consider authpf.
> > > 
> > > However, the proper way to set up a VPN is to set up a VPN.
> > 
> > The only consern I have is users snooping around because they are able
> > to ssh in, besides that sshfs works like a charm and its so easy and
> > quick to setup. I have combined scponly with the servers, and that
> > works well too, but since scponly isn't "safe", as in a lot of work is
> > done security wise, I would not want to run with that as a permanent
> > solution. I trust OpenSSH over any VPN solution anyday, but SSH might
> > cause a problem in other areas, hence the question.
> 
> If you have a restrictive SSH setup (you might want to use sftp for the
> user's shell, or force them to use that command - see ForceCommand in
> sshd_setup(5), and you definitely want to disable port forwarding), I
> don't think you will have too many problems.

Thank you very much for you reply Joachim! I will look into that.
 
>               Joachim

Reply via email to