Hot Diggety! Richard Chycoski was rumored to have written:
>
> You need sshd on a standard port for your *users* to be able to use it. 
> Hiding ssh on a strange port doesn't really add much protection. 

Yep. That as the sole measure, no way!

But when coupled with other steps such as:

        - Two-factor authentication (as you mentioned)

        - Regular patching and restarts of sshd, particularly when vulns
          for sshd / OpenSSL libs are reported

        - Use of pre-setup ssh key + passphrases only (rather than use
          of guessable passwords) to login if two-factor auth is not possible

        - Making users change their password (whether via pam_passwdqc +
          passwd or via a web page somewhere or via built-in capabilities)

> SecureID (or similar) access is good because it requires your users to 
> use 'something they have' (the token generator). Tokens with PINs are 
> better because they require both 'something they have' (the token) plus 
> 'something they know' (the PIN).  This is a two-factor password, and 
> considered secure enough for most any commercial enterprise. *Do* keep 
> your ssh daemon up to date, and do disallow root logins, both as 
> recommended by Ned.

Most definitely. I've worked for employers who used this to good effect
for external-facing bastions. Have had zero compromises due to (say,
sniffed while employee's using laptop in a public place with an
unencrypted AP) stolen password or passphrase.
 
> Using ssh as a gateway is certainly secure enough for most enterprises, 
> although VPNs are more convenient for a lot of users (read: non-techie 
> managers and salespeople, almost always on Windows. :-)

Bit of a mixed bag with regard to the platform. :) At least Cisco's VPN
client works well on Linux and MacOS X. VPN authentication can also be
coupled with two-factor authentication as well.

-Dan
_______________________________________________
Tech mailing list
[email protected]
http://lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to