None.  But then maybe we do and don't know it.

When I set up a reverse tunnel, I take a number of precautions.  I use
large ssh-keys and strong ciphers/MACs.  The jump box has limited
access and capabilities.  The target account on the jump box is locked
down (i.e. ssh-key access only, incoming only from source system IP,
password is random and unknown, etc.).  To access the source system,
you first have to log in to the jump box with your account (again,
ssh-key only, unknown-random password,etc.)  Finally, you need an
account on the source system.

That's the simple setup.  You can get more fancy with Multi-Factor
Authentication, IDS, non-obvious ports, port-knocking, etc.

Hack proof?  No, as nothing ever is.  But the probability is pretty
small.  If there's a weakness, my guess would be that it's not with
the reverse tunnel, the source system, or the jump box, but with
whatever system you use to access those.  There are easier ways to
access the source system than trying to crack into an ssh system:

https://xkcd.com/538/

Good luck and let us know what you discover.

Regards,
- Robert


On Fri, Mar 3, 2017 at 9:13 AM, VY <vyau5...@gmail.com> wrote:
> Unfortunately, I have no access to that person anymore.
>
> Based on your experience, there were no issues that you have run into with
> such deployment?
>
> -v
>
>
> On Fri, Mar 3, 2017 at 9:07 AM, Robert Citek <robert.ci...@gmail.com> wrote:
>
>> I would ask the person who told you that this is not secure to elaborate.
>> I have worked with a number of companies that do this. So I am as curious
>> as you are.
>>
>> Regards,
>> - Robert
>>
>> On Fri, Mar 3, 2017 at 9:01 AM VY <vyau5...@gmail.com> wrote:
>>
>> > Dear All:
>> >
>> > I am supporting a client that has product linux PCs running in the field.
>> > The person before me has built a reverse SSH tunnel (connection initiated
>> > by the device itself back to us and the connection is monitored by
>> > autossh).
>> >
>> > I was told this is not secure.   I am no expert in security.  What are
>> the
>> > possible issues with this approach?  And what would be a more secure
>> > mechanism than reverse SSH?
>> >
>> > thanks
>> >
>> > -v
>> > _______________________________________________
>> > PLUG mailing list
>> > PLUG@lists.pdxlinux.org
>> > http://lists.pdxlinux.org/mailman/listinfo/plug
>> >
>> _______________________________________________
>> PLUG mailing list
>> PLUG@lists.pdxlinux.org
>> http://lists.pdxlinux.org/mailman/listinfo/plug
>>
> _______________________________________________
> PLUG mailing list
> PLUG@lists.pdxlinux.org
> http://lists.pdxlinux.org/mailman/listinfo/plug
_______________________________________________
PLUG mailing list
PLUG@lists.pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to