You can also use the twist or banners feature on tcp wrappers (if enabled)
to display a message when connecting via telnet or rsh. The message can
tell them to use ssh instead of the insecure method.

I have it set up to tell the user to use ssh instead of the insecure
methods.  Some caveats: rsh banners will not display the first character 
and not display more than one line, and the banners will interfere with
programs and automated scripts that use rsh.

yuji
----

On Mon, 18 Oct 1999, Phil Hurvitz wrote:

> Right, I figured this one out after thinking for a little while.  Thanks
> to Chris and the general group for consistent and effective help!
> 
> -P.
> 
> ******************************************************************************
> Phil Hurvitz, MFR | GIS Specialist | College of Forest Resources | 355 Bloedel
> Box 352100 | University of Washington, Seattle, Washington  98195-2100, USA
>  tel: 206.685.8179 | FAX: 206.685.3091 | e-mail: [EMAIL PROTECTED] 
>              WWW: http://lobo.cfr.washington.edu/phurvitz/
> ******************************************************************************
> 
> 
> On Mon, 18 Oct 1999, C. Vandersip wrote:
> 
> > Phil,
> > 
> > The scenarios you suggest aren't possible.  Each client requires it's own
> > daemon in order to work (i.e., telnet requires making a connection to
> > in.telnetd, rlogin requires connecting to in.rlogind, etc.).  You can't
> > route incoming telnet or other requests to sshd. sshd looks for ssh client
> > requests only. It doesn't know what to do with a telnet or rlogin request.
> > There's no similar "handshaking" and, more importantly, there's NO
> > encryption (!!) in those services.
> > 
> > By limiting access in the hosts.allow and hosts.deny files you can block
> > unwanted service connections without the scenarios you describe.  The    
> > strictest way to do this is to deny access to all wrapped services
> > (ALL:ALL in /etc/hosts.deny) and use /etc/hosts.allow to allow trusted
> > hosts to use particular wrapped services:
> > 
> > Example /etc/hosts.allow ---
> > 
> > #Network service permissions are granted to the following remote hosts:
> > #
> > # ssh
> > sshd2: trusted1.host.com,trusted2.host.com
> > #
> > # telnet
> > in.telnetd: trusted1.host.com (or blank if you don't allow this service)
> > #
> > # rlogin
> > in.rlogind: trusted1.host.com (or blank if you don't allow this service)
> > #
> > # rsh
> > in.rshd: trusted1.host.com (or blank if you don't allow this service)
> > #
> > # ftp   
> > in.ftpd: trusted1.host.com (or blank if you don't allow this service)
> > #
> > # finger
> > in.fingerd: trusted1.host.com (or blank if you don't allow this
> > service)
> > 
> > These are Solaris daemon names.  Modify for your OS.
> > 
> > 
> > So, to correct your mischief :), restore your original inetd.conf so that
> > clients point to the right daemons. For example, for telnet requests to
> > work, the line in inetd.conf should read:
> > 
> > telnet stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.telnetd 
> > 
> > so that it finds the right daemon.  Also make sure you restore the orginal
> > port settings (e.g., 22 for ssh, 23 for telnet, 21 for ftp, etc.) in
> > /etc/services.
> > 
> > 
> > Now...and this can be the hardest part...convince those whom you would
> > like to allow to connect to your machine to install ssh on their machine
> > (or SecureCRT or F-Secure for PC/Mac users). :>
> > 
> > 
> > BTW, the only "exception" (of sorts) to this rerouting you describe is
> > that the ssh client can be setup to fall back to rsh (compile with the
> > --with-rsh=/usr/bin/rsh option in configure) if the remote computer you
> > are connecting to does not have the sshd daemon running. Not really the
> > same thing as you describe, but a useful - though not secure - option
> > nonetheless.
> > 
> > 
> > Regards,
> > 
> > Chris
> > 
> > 
> >      ###############################################################
> >      #                      Chris Vandersip                        #
> >      #        Computer Research Specialist/Dept. Sysadmin          #
> >      #  Rm. 024, Dept. of Meteorology, Florida State University    #
> >      #          [EMAIL PROTECTED]   (850)644-2522                #
> >      ###############################################################
> > 
> > On Mon, 18 Oct 1999, Phil Hurvitz wrote:
> > 
> > > Alright, now that I've got ssh using tcp wrappers, here's what I want to
> > > do:
> > > 
> > > Incoming telnet, rsh, rlogin, etc. should be forwarded to ssh rather than
> > > the old-style connections
> > > 
> > > ----
> > > scenario 1:
> > > 
> > > /etc/inetd.conf:
> > >    telnet stream tcp nowait root /usr/sbin/tcpd /usr/local/sbin/sshd -iA
> > >    login stream tcp nowait root /usr/sbin/tcpd /usr/local/sbin/sshd -i
> > > 
> > > to make telnet and login to use ssh through tcp wrapper
> > > 
> > > /etc/services:
> > >    telnet           22/tcp
> > >    login            22/tcp
> > > 
> > > to tell inetd to route incoming login & telnet to the ssh port
> > > 
> > > (kill -HUP inetd.pid)
> > > 
> > > But then I get this:
> > > 
> > > myclient:133# telnet myserver
> > > Trying 128........                 #my edit here
> > > telnet: Unable to connect to remote host: Connection refused
> > > 
> > > ------
> > > scenario 2:
> > > 
> > > I use the standard tcp ports in /etc/services for telnet and login, and
> > > still get Connection refused, which is not surprising.
> > > 
> > > ------
> > > scenario 3:
> > > 
> > > just like scenario 1, but with hosts.allow edited to allow myhost to use
> > > telnet.
> > > 
> > > 
> > > I have a feeling there is something simple I am overlooking.  I'll SUM....
> > > 
> > > -P.
> > > 
> > > ******************************************************************************
> > > Phil Hurvitz, MFR | GIS Specialist | College of Forest Resources | 355 Bloedel
> > > Box 352100 | University of Washington, Seattle, Washington  98195-2100, USA
> > >  tel: 206.685.8179 | FAX: 206.685.3091 | e-mail: [EMAIL PROTECTED] 
> > >              WWW: http://lobo.cfr.washington.edu/phurvitz/
> > > ******************************************************************************
> > > 
> > 
> > 
> > 
> 
> 
> 

Yuji Shinozaki                  Systems Administrator
[EMAIL PROTECTED]            Dept of Physics and Astronomy
http://www.physics.unc.edu      Univ. of North Carolina - CH
(919)962-7214 (voice)           CB 3255 Philips Hall
(919)962-0480 (fax)             Chapel Hill, NC  27599

Reply via email to