This is an interesting question.  Might it not make more sense to find a 
way to disable SCP at the server?  Perhaps a n sshd_config option.  It 
would be a long term solution, not something to give this guy right now, 
but it might be a useful hack for corporate types.  On the other hand, 
it occurs to me that if you can get access to the data through an SSH 
Shell, or a telnet shell, blocking SCP or FTP puts is not really 
providing any more security.   Think about it.  Most OS's these days 
have a screencapture, if I really want sensitive data I could  just 
capture it from adisplay... It doesn't even seem that it would be 
terrible difficult  to streamlarge amounts of data (to much for capture) 
into a file (some sort of displayredirect to a file).  I've never tried, 
but it seems fairly possible (atleast on *nix) .  And leaving your 
login/passwords in the clear on the wiresounds much more dangerous to me 
than allowing FTP puts.  A secure shellgateway in from the 'net does 
sound like a good idea, we use something similarhere (only for Telnets 
though, secure connections are allowed through) it would require a two 
ply firewall though (one in front of the gatewayto disallow everything 
but secure connections, one behind to prevent FTPputs to the gateway, 
thus creating the whole problem over. )  Still, all in all I don't 
thinnk there is a whole lot of security added by preventing SCP/FTP.

Michael Jinks wrote:

> "H. Wade Minter" wrote:
> 
>> So my question is: Is there any way, on a firewall-type level, to block scp
>> traffic, while allowing ssh and slogin?  This would allow them to stop file
>> copies, but let secure shells go through.
> 
> 
> At the firewall, I don't think so; my understanding is that scp is
> really just a wrapper around ssh, and that to a router, ssh and scp are
> going to look exactly the same.
> 
> What about setting up some kind of gateway/proxy service, such that
> packets get encrypted at or before the firewall, but after the net nazis
> have a chance to snoop them?  Say, a single box which is allowed ssh
> access past the firewall, but which only accepts connections via
> telnet.  Internal Security or HR is responsible for that box.  Log all
> command lines, log all network traffic to and from that box, but you
> (and your company, which should care about this IMHO if they're that
> paranoid about their data) gain the benefits of encryption outside the
> private net.
> 
> Not an ideal solution but then neither is requiring telnet over ssh...
> 

-- 

Thank you,

Trevor Antczak
Network Administrator II                
Tulane University Math Dept.
[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>
(504) 862-3457

Reply via email to