On Fri, Mar 24, 2000 at 09:31:25PM +0100, Antonio Fiol Bonnín wrote:
> <snip>
> > I want to have easy freedom in limiting user access.  I have killed
> > telnetd, and only sshd.  I want to allow some users access through ssh,
> > some through ftpd, and some through samba.  How can I turn off user
> > access through ssh, but keep their account, and allow them access
> > through ftp?  Can I allow users access to shares through samba, and
> > allow them to ftp in, but not ssh or telnet? 
> 
> Just a note there:
> 
> I imagine that if you install and make your users use ssh, it's because
> you do not want the passwords of the users to be visible through the net,
> isn't it?
> 
> Other than that, you propose the use of ftp, which uses non-ciphered
> communication. Well, all the passwords that were not visible with ssh are
> now visible with ftp.

this is a very good point, but as far as i have been able to find,
there is no suitable, secure, replacement for ftp (why!?!?!)

the only solutions i see are:

1) force users with ssh access to exclusivly use scp.  problem with
this is some ssh clients on broken platforms either do not have scp,
or have very crappy/clumsy implementations.  you also have to enter a
password over and over again (afait) perhaps this can be delt with by
using ssh-agent (i need to get around to looking at that..) but only
on *nix platforms.  and if you have say a win* or worse macos user,
telling them they can't use there purdy drag and drop ftp client will
get you shot.  and finally if you don't want to give ftp users ssh
access this is not an option. (though for those you can put them in a
chroot jail and minimize the risks)

2) use ssh to tunnel the ftp connection.  I may be doing something
wrong but i have never managed to get this to work.  this is also a
somewhat obscure solution to propose to the clients. it also (again
afaict) requires the user to have a interactive ssh account.  again
this won't work for ftp only users. 

3) I think there is SSLized ftp but this would require a SSLized
client which are probably not avaiable on macos.  (if you have mac
users this is a problem) and if the user likes thier more purdy
insecure client better you have the problem in 1)...

4) IPsec or some other VPN that encrypts the whole damn thing all the
way down to pings.  but this is a rather complicated solution,
especially with the macos/win* user problem. (or simply lots of users
in general)

so what can you do?  maintain a separate passwd file for ftp?  you
still have a fairly large breach if someone gets into the ftp account,
and the user cannot change this password (i assume using pam_pwdfile)
you also get annoyed users having to remember two password and likely
just setting the ssh password the same, eliminating any advantage...

ftp seems to be an evil that is very hard to eliminate, it has no
cross platform secure replacement (yes i have heard of sftp with ssh2,
2 words: no clients and 1(2?) more: non-free)  if all your users
actually care about your security there are solutions (user gets a
*nix OS and uses scp+ssh-agent ;-)) but for most users who don't care
about your security if it interferes with there ability to use the
purdy insecure macos/win* client software your screwed...

I would like nothing better then to be proven wrong on this one!  i
dare you! show me a solution that solves the problem of convenient
file transfer from stubborn users who insist on ease of use over
security (purdy GUI drag and drop ftp client over a clumsy scp client
on their broken OS) as well as ftp only accounts without promisquous
password blabbing across the net.  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

Reply via email to