Re: Server Security (was SSH attack)

2005-12-21 Thread Chris Brenton
On Mon, 2005-12-19 at 22:22 -0500, Greg Rundlett wrote: The environment I find myself in now is unlike ones that I'm used to. SSH is allowed for some hosts while not for others. For most host access, you need to go through a single point of entry (sentry), and then ssh from there over the

Re: Server Security (was SSH attack)

2005-12-20 Thread Tom Buskey
On 12/19/05, Greg Rundlett [EMAIL PROTECTED] wrote: The environment I find myself in now is unlike ones that I'm used to.SSH is allowed for some hosts while not for others.For most hostaccess, you need to go through a single point of entry (sentry), andthen ssh from there over the local

Re: Server Security (was SSH attack)

2005-12-20 Thread Neil Joseph Schelly
On Monday 19 December 2005 10:22 pm, Greg Rundlett wrote: The environment I find myself in now is unlike ones that I'm used to. SSH is allowed for some hosts while not for others. For most host access, you need to go through a single point of entry (sentry), and then ssh from there over the

Re: Server Security (was SSH attack)

2005-12-20 Thread Adam Helbling
On 12/20/05, Neil Joseph Schelly [EMAIL PROTECTED] wrote: On Monday 19 December 2005 10:22 pm, Greg Rundlett wrote: The environment I find myself in now is unlike ones that I'm used to. SSH is allowed for some hosts while not for others.For most host access, you need to go through a single point

Re: Server Security (was SSH attack)

2005-12-20 Thread Ben Scott
On 12/20/05, Neil Joseph Schelly [EMAIL PROTECTED] wrote: It sounds like the network you're using now could use a VPN. VPN's are great at creating tunnels between two trusted systems. They're not so good when one party (say, a hosting company) wants to provided restricted access to another

Re: Server Security (was SSH attack)

2005-12-20 Thread Bill McGonigle
On Dec 19, 2005, at 22:22, Greg Rundlett wrote: For most host access, you need to go through a single point of entry (sentry), and then ssh from there over the local network... I am not really sure what tricks I need to get rsync to go from box C (desktop) to box B (sentry) to box A (host)

Re: Server Security (was SSH attack)

2005-12-20 Thread Tom Buskey
On 12/20/05, Bill McGonigle [EMAIL PROTECTED] wrote: I also have these on my 'look at pretty soon' list: http://www.cskk.ezoshosting.com/cs/css/bin/hotfwd http://www.cskk.ezoshosting.com/cs/css/bin/sshtohttp://www.cskk.ezoshosting.com/cs/css/Lots of cool looking scripts including ssh forwarding

Server Security (was SSH attack)

2005-12-19 Thread Greg Rundlett
I've got a number of servers at a hosting company that were configured prior to my becoming responsible for them. Traditionally, I've used SSH to do minor editing on servers, but more and more, I've come to rely on KDE's ability to 'speak' SSH to just browse (Konqueror) files on remote machines,