On Mon, Apr 23, 2007 at 09:28:53PM +0200, Rico Secada wrote:
> Hi 
> 
> I need some comments from you guys on using sshfs as a solution at
> work. 
> 
> I need to make some of our NFS servers available for employees at
> their homes (where they live). I have been looking at both IPSec
> together with VPN, but I really like SSH better. At debian mailinglist
> I got a suggestion about using sshfs and nothing else, I really love
> SSH, but are a bit worried about users being able to ssh in. With
> sshfs the workers can mount their home directories like with nfs.
> 
> If userlands are setup chmod 700, and each user are in no groups but
> themselves, does this pose a security risk? 

This is a public mailing list. Trim your message at 72 columns.

> [demime 1.01d removed an attachment of type application/pgp-signature which 
> had a name of signature.asc]

mail.html specifically states not to do this, and posting them as an
attachment is particularly useless.

However, I presume you came here looking for advice that actually
pertains to your question.

sshfs uses FUSE, which is at the moment Linux-only. It's also an
interesting, but rather scary, contraption. Getting it installed might
not be easy. (I say 'might' because I've never tried it; for all I know,
all major distributions have a package and compile the relevant part
into their stock kernels. Does anybody have more information?)

If the goal is to use SSH, you might want to take a look at ssh -w; I
believe that will work for you, but read the docs first. As an
alternative, consider switching to something with fixed port
allocations (CIFS/SAMBA, AFS) and port forwarding.

Finally, if confidentiality does not matter, consider authpf.

However, the proper way to set up a VPN is to set up a VPN.

                Joachim

-- 
TFMotD: amd (8) - automatically mount file systems

Reply via email to