On Fri, Aug 21, 2009 at 10:34:05PM +0800, Uwe Dippel wrote:
> Now I am pretty sure that this is what we see here.
> It also makes sense, since all those users sit on a tightly controlled  
> LAN; while that machine is 'further out'. So that restricted services  
> can be accessed through some tunneling.
> Now: How to prevent it?? I have hundreds of users, who can log on from  
> hundreds of machines, and all need access to ssh, and easily 30 at the  
> same time.
> So, filtering IP addresses is out, nologin is out, no ssh is out.
> Of course, I can politely ask, but I would not necessarily trust it to  
> be followed. I'd much rather disallow it technically. At least, have an  
> easy access to the record (e.g. in 'last'). But since it doesn't require  
> logon, what to do? And how to prevent this??
>
> Any suggestion appreciated,

After you've confirmed that they do this for TCP forwarding use, and
you're convinced that this is what you want to prevent, simply edit
sshd_config(5), set AllowTcpForwarding to No and restart the master
sshd(8).

Cheers,

Paul 'WEiRD' de Weerd

-- 
>++++++++[<++++++++++>-]<+++++++.>+++[<------>-]<.>+++[<+
+++++++++++>-]<.>++[<------------>-]<+.--------------.[-]
                 http://www.weirdnet.nl/                 

Reply via email to