On Fri, Aug 21, 2009 at 10:34:05PM +0800, Uwe Dippel wrote:
> Paul de Weerd wrote:
>>
>> You could check for the presence of forwarded TCP sessions with fstat,
>> an exmaple looks like this :
>>
>> weerd    sshd       29016   11* internet stream tcp 0x40009ab33d0 
>> 127.0.0.1:44410 --> 127.0.0.1:3128
>>
>> If you open an ssh session to a remote machine with a forwarded port,
>> then open the forwarded port and once the connection over the
>> forwarded port has been established ^D the initial session, you'll get
>> the behaviour you just described. The established TCP session over the
>> forwarded connection keeps the SSH session alive but the user is shown
>> as logged out (and no processes show other than the sshd's you
>> mentioned).
>>   
>
> Now I am pretty sure that this is what we see here.
> It also makes sense, since all those users sit on a tightly controlled  
> LAN; while that machine is 'further out'. So that restricted services  
> can be accessed through some tunneling.
> Now: How to prevent it?? I have hundreds of users, who can log on from  
> hundreds of machines, and all need access to ssh, and easily 30 at the  
> same time.
> So, filtering IP addresses is out, nologin is out, no ssh is out.
> Of course, I can politely ask, but I would not necessarily trust it to  
> be followed. I'd much rather disallow it technically. At least, have an  
> easy access to the record (e.g. in 'last'). But since it doesn't require  
> logon, what to do? And how to prevent this??
>
> Any suggestion appreciated,
>
Turn off ssh forwarding? set AllowTcpForwarding to no, in your sshd_config.

Of course, with a bit of effort and some netcat, the user will probably still
be able to turn a normal connection into forwarding, but this should at least
make it more difficult.

> Uwe
>
>

-- 

-- 

Reply via email to