On Fri, Aug 21, 2009 at 7:34 AM, Uwe Dippel<[email protected]> wrote:

> Now I am pretty sure that this is what we see here.
> It also makes sense, since all those users sit on a tightly controlled LAN;
> while that machine is 'further out'. So that restricted services can be
> accessed through some tunneling.
> Now: How to prevent it?? I have hundreds of users, who can log on from
> hundreds of machines, and all need access to ssh, and easily 30 at the same
> time.
> So, filtering IP addresses is out, nologin is out, no ssh is out.
> Of course, I can politely ask, but I would not necessarily trust it to be
> followed. I'd much rather disallow it technically. At least, have an easy
> access to the record (e.g. in 'last'). But since it doesn't require logon,
> what to do? And how to prevent this??

Read the man page for ssh_config(5) and sshd_config(5), and look at
restricting what your users can do.

Specifically: AllowTcpForwarding, PermitOpen and PermitTunnel,
combined with Match.

Reply via email to