At a couple of places in the past, I've set up an SSH jump box to allow access
to internal systems. Each person with login access to the jump box had his/her
login shell set to a script (jumpsh) that brought up a prompt immediately after
logging in. The user would need to enter one of the codes matching an internal
host in a configuration file; if one of the correct codes was entered, an SSH
session would then be initiated to the matching internal host. (There are
limited tries before logout, and delays between tries, to defend against
attacks.) You couldn't get a normal command prompt on the jump box itself
(unless you had a code configured for "localhost"). This system requires
successful authentication on the jump box (depending on how you've configured
sshd), knowledge of at least one of the codes in the configuration file, and
then successful authentication to the internal host (usually key-based). More
details are here:
http://www.occam.com/tools/README.jumpsh-3.1
with jumpsh (a simple Perl script) downloadable here:
http://www.occam.com/tools/
In addition, it's best if the jump box is on a protected DMZ.
And it's a good idea to have the SSH service listing on a non-standard port,
either with a network device that does port mapping, or by specifying an
alternate Port in sshd_config. It eliminates the usual storm of people trying
to break in; I was shocked at how the rogue login attempts disappeared after
doing that. It also adds one more thing that a legitimate user needs to know to
log in.
--------------------------------------------------------------------
Leon Towns-von Stauber http://www.occam.com/leonvs/
"We have not come to save you, but you will not die in vain!"
On Mar 20, 2014, at 7:26 AM, Kenton Brede wrote:
> Years ago when I started administering linux boxes, some of our boxes had
> sshd open to the world. So I devised kind of "poor person's" two-factor
> password authentication. It worked like this:
>
> admin1: could login to the system and su only to admin1ad.
> admin1ad: could not login, could su to root.
>
> Currently for all of our boxes, port 22 is behind a VPN. Some of us are
> using ssh keys for the initial login but password authentication is still
> enabled.
>
> I'm thinking about disabling password auth, using keys only and passwordless
> sudo access. Everyone would just have one user account. It sounds like at
> some point we'll be moving to two-factor for our VPN.
>
> Is this pretty much standard practice these days? Is it reasonably secure?
> If not, how are you all handling ssh authentication?
>
> Thanks,
>
> --
> Kent Brede
> _______________________________________________
> Tech mailing list
> [email protected]
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
> http://lopsa.org/
_______________________________________________
Tech mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
http://lopsa.org/