Re: Locking down a guest account - need help.

2001-08-06 Thread Mike Renfro

On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:

  1. How to dissallow network connections to this guest account? I don't
 want anyone ssh'ing in, but I still want to be able to remotely administer
 the machines.

man sshd --

 DenyUsers
 This keyword can be followed by a number of user names, separated
 by spaces.  Login is disallowed for user names that match one of
 the patterns.  `*' and `?' can be used as wildcards in
 the patterns.  Only user names are valid, a numerical user id
 isn't recognized.  By default login is allowed regardless
 of the username.

there are similar DenyGroups, AllowUsers, and AllowGroups directives,
too. This is *the* simplest solution. If you're PAM-savvy, there are
options there, too (easiest is to use pam_listfile to allow/deny
access to people listed in a particular file). However, it's really
easy to shoot yourself in the foot with PAM. Plus, you'd certainly
want to disable any other network access methods you can (ftp and
friends).

If all the people need to do is browse the web and ssh out, you can
also make a firewall rule that allows traffic to and from any remote
hosts port 22, 80, or 443.

-- 
Mike Renfro  / RD Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: snort 1.8 for demarc

2001-08-06 Thread Mike Renfro

On Sun, Aug 05, 2001 at 07:41:41PM +, Marco Tassinari wrote:

 /usr/local/lib/libpcap.a(gencode.o): In function `pcap_compile':
 gencode.o(.text+0x203): undefined reference to `lex_init'
 /usr/local/lib/libpcap.a(grammar.o): In function `yyparse':
 grammar.o(.text+0x94): undefined reference to `yylex'
 grammar.o(.text+0x9ba): undefined reference to `yylex'

You have bison installed too? Or just flex? I think yylex calls are
frequently references to yacc.

-- 
Mike Renfro  / RD Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Code Red Worm

2001-08-06 Thread Brandon High

Code Red v2 is wreaking havoc already today. It's liquefied our corporate
firewall.

I've was probed by it 200 times on Sunday as well, vs. maybe 30/day for v1.

-B

-- 
Brandon High [EMAIL PROTECTED]
Remember that silence is sometimes the best answer.

 PGP signature


Re: Locking down a guest account - Got Help. THANKS!

2001-08-06 Thread David Ehle


Thank all!

   You help and suggestions have helped me over the current stumbling
blocks and its (hopefully) all down hill from here.  I finally ditched
enlightenment and went with sawmill.  A couple menus deep was keybinding
and by just disabeling the entry for root_menu, I was able to seal up the
desktop interface without crippling the rest of the users.  Now all thats
left is disabaling all the tty sessions and going over permissions with a
fine tooth comb.

 Thanks again!
   david.


On Mon, 6 Aug 2001, Mike Renfro wrote:

 On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:

   1. How to dissallow network connections to this guest account? I don't
  want anyone ssh'ing in, but I still want to be able to remotely administer
  the machines.

 man sshd --

  DenyUsers
  This keyword can be followed by a number of user names, separated
  by spaces.  Login is disallowed for user names that match one of
  the patterns.  `*' and `?' can be used as wildcards in
  the patterns.  Only user names are valid, a numerical user id
  isn't recognized.  By default login is allowed regardless
  of the username.

 there are similar DenyGroups, AllowUsers, and AllowGroups directives,
 too. This is *the* simplest solution. If you're PAM-savvy, there are
 options there, too (easiest is to use pam_listfile to allow/deny
 access to people listed in a particular file). However, it's really
 easy to shoot yourself in the foot with PAM. Plus, you'd certainly
 want to disable any other network access methods you can (ftp and
 friends).

 If all the people need to do is browse the web and ssh out, you can
 also make a firewall rule that allows traffic to and from any remote
 hosts port 22, 80, or 443.




--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Locking down a guest account - need help.

2001-08-06 Thread Mike Fedyk

On Sat, Aug 04, 2001 at 12:30:20AM +0200, Tobias wrote:
 Hello!
 
 you can disable password login in sshd and only run ssh with public
 key authentication, just don't forget to put a root owned non-writable
 folder or file called .ssh and .ssh2 in the accounts you do not wish
 people to log in to.
 
 And I agree with Jim Breton about locking down PAM as much as possible.
 

Umm...

Once you deny password login and only key based auth, how are they
going to create the file in the first place?


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




No local user authentication with openssh2.9

2001-08-06 Thread Yussef Elsirgany


Dear List,

I am having a great deal of problem setting up openssh-2.9 in my debian
setup.  Can anyone tell me why any of my local users don't get authenticated
when using openssh.  It works fine when I use ssh 3.01 btw.  If anyone can
help me make the switch it would be greatly appreciated.

Here is a snippet of a session I started (daemon + client info)

reliant:~# sshd -d -d -d 
[1] 6845
reliant:~# debug1: Seeding random number generator
debug1: sshd version OpenSSH_2.9p2
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /usr/local/etc/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: No RSA1 key file /usr/local/etc/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: Bind to port 22 on 192.168.1.102.
Server listening on 192.168.1.102 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 192.168.1.101 port 2487
debug1: Client protocol version 1.5; client software version PuTTY
debug1: no match: PuTTY
debug1: Local version string SSH-1.99-OpenSSH_2.9p2
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: 3des
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for yussef.
Failed password for johnsmith from 192.168.1.101 port 2487
Failed password for johnsmith from 192.168.1.101 port 2487
Failed password for johnsmith from 192.168.1.101 port 2487
Failed password for johnsmith from 192.168.1.101 port 2487
Read from socket failed: Connection reset by peer
debug1: Calling cleanup 0x806573c(0x0)

[1]+  Exit 255sshd -d -d -d

---client info--

login as: johnsmith
Sent username johnsmith
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied

---client info--


Thanks and Best Regards,

Yussef M. ElSirgany
Software Engineer

Email: [EMAIL PROTECTED]
Phone: 631-645-7588
Fax:   516-484-2424



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Locking down a guest account - need help.

2001-08-06 Thread Eli Boaz
On Sat, Aug 04, 2001 at 12:30:20AM +0200, Tobias wrote:
 Hello!
 
 you can disable password login in sshd and only run ssh with public
 key authentication, just don't forget to put a root owned non-writable
 folder or file called .ssh and .ssh2 in the accounts you do not wish
 people to log in to.
 

Putting a root-owned file in a directory owned by a user is not much help
against a UNIX savvy-user. The user would still be able to rename the
file(s). You could create the .ssh / .ssh2 directories or files (owned by
root), and then use the ``chattr +i dirname'' command on each directory
or file to protect it. This is for ext2fs only, but other filesystems may
have equivalent commands.

[FYI, chattr +i sets the immutable flag in the ext2 filesystem, rendering
the file unchangable. chattr -i will remove the flag. Read the man page
for more info.]

Just my $0.02 worth,

-- 
Eli Boaz ([EMAIL PROTECTED])
GNU/Linux: Free your computer from bad software. http://www.debian.org/


pgpLhGggWLlWK.pgp
Description: PGP signature


Re: syslog-ng issue

2001-08-06 Thread Jeff Coppock
Jeff Coppock, 2001-Aug-05 09:04 -0700:
I'm trying to cleanup my logging using syslog-ng (version
1.5.6-1).  The problem at this point is that my firewall
(iptables) logs are showing up in my newly setup firewall log
file, and still in the messages kern.log and syslog files.  

I used the default syslog-ng.conf file and added the following
lines to the appropriate sections:

destination firewall { file(/var/log/firewall owner(root)
group(adm) perm\(0640)); };
 
filter f_firewall { match(Dropped: .*IN=.*OUT=.*); };
 
log { source(src); filter(f_firewall); destination(firewall); };

My desire is to have all firewall logs go ONLY to the firewall
log file.

Does the order in which these entries occur matter?  I just
noticed that the destination entry was at the end of that
section while the filter and log entries are at the beginning.
I moved the destination entry to the beginning of that
section and will watch the logs.

thanks for any help...jc

   Well, I figured it out.  More time and reading always seems to
   make a difference.  Basically, I added another filter to not
   match the firewall messages and used that filter with the
   messages, kern.log and syslog log entries and it works great.
   
   jc

-- 

Jeff CoppockNortel Networks
Systems Engineerhttp://nortelnetworks.com
Major Accts.Santa Clara, CA



Re: Locking down a guest account - need help.

2001-08-06 Thread Mike Renfro
On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:

  1. How to dissallow network connections to this guest account? I don't
 want anyone ssh'ing in, but I still want to be able to remotely administer
 the machines.

man sshd --

 DenyUsers
 This keyword can be followed by a number of user names, separated
 by spaces.  Login is disallowed for user names that match one of
 the patterns.  `*' and `?' can be used as wildcards in
 the patterns.  Only user names are valid, a numerical user id
 isn't recognized.  By default login is allowed regardless
 of the username.

there are similar DenyGroups, AllowUsers, and AllowGroups directives,
too. This is *the* simplest solution. If you're PAM-savvy, there are
options there, too (easiest is to use pam_listfile to allow/deny
access to people listed in a particular file). However, it's really
easy to shoot yourself in the foot with PAM. Plus, you'd certainly
want to disable any other network access methods you can (ftp and
friends).

If all the people need to do is browse the web and ssh out, you can
also make a firewall rule that allows traffic to and from any remote
hosts port 22, 80, or 443.

-- 
Mike Renfro  / RD Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]



Re: snort 1.8 for demarc

2001-08-06 Thread Mike Renfro
On Sun, Aug 05, 2001 at 07:41:41PM +, Marco Tassinari wrote:

 /usr/local/lib/libpcap.a(gencode.o): In function `pcap_compile':
 gencode.o(.text+0x203): undefined reference to `lex_init'
 /usr/local/lib/libpcap.a(grammar.o): In function `yyparse':
 grammar.o(.text+0x94): undefined reference to `yylex'
 grammar.o(.text+0x9ba): undefined reference to `yylex'

You have bison installed too? Or just flex? I think yylex calls are
frequently references to yacc.

-- 
Mike Renfro  / RD Engineer, Center for Manufacturing Research,
931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED]



Code Red Worm

2001-08-06 Thread Brandon High
Code Red v2 is wreaking havoc already today. It's liquefied our corporate
firewall.

I've was probed by it 200 times on Sunday as well, vs. maybe 30/day for v1.

-B

-- 
Brandon High [EMAIL PROTECTED]
Remember that silence is sometimes the best answer.


pgprANIiatAeH.pgp
Description: PGP signature


Re: Locking down a guest account - Got Help. THANKS!

2001-08-06 Thread David Ehle

Thank all!

   You help and suggestions have helped me over the current stumbling
blocks and its (hopefully) all down hill from here.  I finally ditched
enlightenment and went with sawmill.  A couple menus deep was keybinding
and by just disabeling the entry for root_menu, I was able to seal up the
desktop interface without crippling the rest of the users.  Now all thats
left is disabaling all the tty sessions and going over permissions with a
fine tooth comb.

 Thanks again!
   david.


On Mon, 6 Aug 2001, Mike Renfro wrote:

 On Fri, Aug 03, 2001 at 12:46:10PM -0500, David Ehle wrote:

   1. How to dissallow network connections to this guest account? I don't
  want anyone ssh'ing in, but I still want to be able to remotely administer
  the machines.

 man sshd --

  DenyUsers
  This keyword can be followed by a number of user names, separated
  by spaces.  Login is disallowed for user names that match one of
  the patterns.  `*' and `?' can be used as wildcards in
  the patterns.  Only user names are valid, a numerical user id
  isn't recognized.  By default login is allowed regardless
  of the username.

 there are similar DenyGroups, AllowUsers, and AllowGroups directives,
 too. This is *the* simplest solution. If you're PAM-savvy, there are
 options there, too (easiest is to use pam_listfile to allow/deny
 access to people listed in a particular file). However, it's really
 easy to shoot yourself in the foot with PAM. Plus, you'd certainly
 want to disable any other network access methods you can (ftp and
 friends).

 If all the people need to do is browse the web and ssh out, you can
 also make a firewall rule that allows traffic to and from any remote
 hosts port 22, 80, or 443.





Re: Locking down a guest account - need help.

2001-08-06 Thread Mike Fedyk
On Sat, Aug 04, 2001 at 12:30:20AM +0200, Tobias wrote:
 Hello!
 
 you can disable password login in sshd and only run ssh with public
 key authentication, just don't forget to put a root owned non-writable
 folder or file called .ssh and .ssh2 in the accounts you do not wish
 people to log in to.
 
 And I agree with Jim Breton about locking down PAM as much as possible.
 

Umm...

Once you deny password login and only key based auth, how are they
going to create the file in the first place?



No local user authentication with openssh2.9

2001-08-06 Thread Yussef Elsirgany

Dear List,

I am having a great deal of problem setting up openssh-2.9 in my debian
setup.  Can anyone tell me why any of my local users don't get authenticated
when using openssh.  It works fine when I use ssh 3.01 btw.  If anyone can
help me make the switch it would be greatly appreciated.

Here is a snippet of a session I started (daemon + client info)

reliant:~# sshd -d -d -d 
[1] 6845
reliant:~# debug1: Seeding random number generator
debug1: sshd version OpenSSH_2.9p2
debug1: private host key: #0 type 0 RSA1
debug3: No RSA1 key file /usr/local/etc/ssh_host_rsa_key.
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug3: No RSA1 key file /usr/local/etc/ssh_host_dsa_key.
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: Bind to port 22 on 192.168.1.102.
Server listening on 192.168.1.102 port 22.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: Server will not fork when running in debugging mode.
Connection from 192.168.1.101 port 2487
debug1: Client protocol version 1.5; client software version PuTTY
debug1: no match: PuTTY
debug1: Local version string SSH-1.99-OpenSSH_2.9p2
debug1: Rhosts Authentication disabled, originating port not trusted.
debug1: Sent 768 bit server key and 1024 bit host key.
debug1: Encryption type: 3des
debug1: Received session key; encryption turned on.
debug1: Installing crc compensation attack detector.
debug1: Attempting authentication for yussef.
Failed password for johnsmith from 192.168.1.101 port 2487
Failed password for johnsmith from 192.168.1.101 port 2487
Failed password for johnsmith from 192.168.1.101 port 2487
Failed password for johnsmith from 192.168.1.101 port 2487
Read from socket failed: Connection reset by peer
debug1: Calling cleanup 0x806573c(0x0)

[1]+  Exit 255sshd -d -d -d

---client info--

login as: johnsmith
Sent username johnsmith
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied
[EMAIL PROTECTED]'s password:
Access denied

---client info--


Thanks and Best Regards,

Yussef M. ElSirgany
Software Engineer

Email: [EMAIL PROTECTED]
Phone: 631-645-7588
Fax:   516-484-2424