On Fri, Aug 21, 2009 at 10:34:05PM +0800, Uwe Dippel wrote:
> Now I am pretty sure that this is what we see here.
> It also makes sense, since all those users sit on a tightly controlled
> LAN; while that machine is 'further out'. So that restricted services
> can be accessed through some tunneling.
> Now: How to prevent it?? I have hundreds of users, who can log on from
> hundreds of machines, and all need access to ssh, and easily 30 at the
> same time.
> So, filtering IP addresses is out, nologin is out, no ssh is out.
> Of course, I can politely ask, but I would not necessarily trust it to
> be followed. I'd much rather disallow it technically. At least, have an
> easy access to the record (e.g. in 'last'). But since it doesn't require
> logon, what to do? And how to prevent this??
>
> Any suggestion appreciated,
After you've confirmed that they do this for TCP forwarding use, and
you're convinced that this is what you want to prevent, simply edit
sshd_config(5), set AllowTcpForwarding to No and restart the master
sshd(8).
Cheers,
Paul 'WEiRD' de Weerd
--
>++++++++[<++++++++++>-]<+++++++.>+++[<------>-]<.>+++[<+
+++++++++++>-]<.>++[<------------>-]<+.--------------.[-]
http://www.weirdnet.nl/