[NTLUG:Discuss] SSH
severian@pobox.com
severian at pobox.com
Tue Oct 14 23:02:00 CDT 2003
Jack,
Thank you for the comments. They prompted further questions which I
have put after your words.
Good day,
Ralph
In response to the welcome remarks of Jack Snodgrass at 06:00 AM 10/14/03
-0500:
>couple of thoughts:
>
>you say" on a Windows machine driving her desktop Windows machine"
> is that one or two windows boxes that they have? If it's two,
> why can't one be a linux box. If you have two linux boxes you
> can run a simple VPM with vtund on both boxes.
My boss has a Windows box on her desk at work. It has programs like
Quickbooks that she sometimes want to look up information on while at
home. At home, the family computer is a Windows computer. I can't change
either of those. But, anyplace a new machine is needed, I'll use Linux, if
appropriate, as I believe it is here.
>speaking of VPN, why not run a VPN server on your linux box
> and let the customer connect using MS VPN client?
It is nothing more than incompetence on my part. I tried several times
to get a VPN set up, but I could never get it to work. I am the only one
at the office most of the time and the frequent interruptions(mostly hone
calls) are a contributing factor here. The MS VPN client needs an
expensive VPN server, or at least I thought it did. I have time I can
spend, but not much of a budget.
>as for SSH:
> only use ssh2.
> use Etunnel from www.vandyke.com ( $59 license ) to establish
Thanks for the pointer. I'll read up on that. Although for the basic
port forwarding, Putty seems to work fine. I'll be interested to see what
is better.
> use a non standard port for the server/client. Lots of hackers
> try and access port 22.
I was thinking about that, but I wasn't sure if it was worth the
trouble. It is certainly easy to do.
> use tcpwrappers or iptables to limit access to the ssh port to
> specific ip addresses.
> don't allow plain text passwords. use keys only.
Both remote workers are on systems where they will not have long term
IP leases. I mentioned how I was thinking about handling this in a
response to Chris. Basically, I'll give each remote machine a name put the
IPs in the hosts file. One point here seems redundant. Maybe it isn't
really, but it seems tthat way. If I disallow passwords and require keys,
doen't that limit the ip addresses? The keys contain the IP address or the
name, so only a matching IP address or name can do a public/private key
match. If this is't true, what am I missing?
>
>ftp/telnet:
> NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO NO
> ( repeat this line 50000 times )
Since you are so emphatic, I guess you disagree with my having closed
these ports already. Do you really think I should oen them back up ;-)
More information about the Discuss
mailing list