On 5/3/2013 10:05 AM, Fleuriot Damien wrote:
Thanks for your response Markham,


I'm afraid labor law is much too protective here for us to be able to "educate" 
users in this way;)

Your idea to run a cron job every X minutes has merit though, I'll try and 
check into that !


If labor law's stopping you, what does the law say about security/privacy breaches because someone stole a laptop that was still connected to your server?

Run a cron job, and kill any ssh process that's lasted longer than five minutes, ignore what's being ran. Also kill any detached process by that user. If you must do something, you probably have sudo rights to pause cron. Why are you allowing ssh if you're not letting it be usable?

I might also look into the annoyance of having a different authentication method just for ssh, setting it's pam config to be different than other services. If everything else uses kerberos, have ssh just use unix and not kerberos. It seems like a simple way to further limit access.
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"

Reply via email to