Re: [ubuntu-uk] Preventing a hack attempt

2010-08-31 Thread Paul Morgan-Roach
> On Sat, 2010-08-28 at 01:22 +0100, Daniel Case wrote: > > Hi there, > > > > One of my servers has recently been attacked, it has one remote SSH > > user which cannot run 'sudo', i made it like that so that if it was > > comprimized, no-one would be able to do much. > > > > However, someone mana

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-29 Thread Glen Mehn
Yes, you can do it. Basically, you want to set up a "local port" and a "remote port". I don't have a windows box in front of me, but it's under tunneling somehwere. You can create SSH keys for windows boxes using the putty keygen tool. -g On 28/08/10 19:46, Jacob Mansfield wrote: > any way t

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Jacob Mansfield
any way to do that through putty? On 28 August 2010 18:13, Alan Lord (News) wrote: > On 28/08/10 17:37, Matthew Macdonald-Wallace wrote: > > If the VNC Server is on the same machine that you are ssh'ing into, > > then the command would look as follows: > > > > ssh -C -L 5900:localhost:5900@ -N&

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Alan Lord (News)
On 28/08/10 17:37, Matthew Macdonald-Wallace wrote: > If the VNC Server is on the same machine that you are ssh'ing into, > then the command would look as follows: > > ssh -C -L 5900:localhost:5900@ -N& We do this to manage some of our customers' servers. We also use private/public key pairs, an

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Matthew Macdonald-Wallace
Quoting Jacob Mansfield : > how do I do that? Assuming that both machines (the VNC Client and the VNC Server) are running Linux and the VNC server is on port 5900, then run the following command: ssh -C -L 5900::5900 @ -N & Then setup your vnc client to connect to port 5900 on localhost. I

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Jacob Mansfield
how do I do that? On 28 August 2010 15:30, Matthew Macdonald-Wallace < matt...@truthisfreedom.org.uk> wrote: > Quoting Jacob Mansfield : > > > I have vnc to my servers, but it's locked down to my work and internal > home > > addresses only using firestarter. would this be an option for you? > > T

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Matthew Macdonald-Wallace
Quoting Jacob Mansfield : > I have vnc to my servers, but it's locked down to my work and internal home > addresses only using firestarter. would this be an option for you? Tunnel the VNC over ssh - it's more secure and it makes it much harder for someone to sniff the traffic. M. -- Matthew M

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Jacob Mansfield
I have vnc to my servers, but it's locked down to my work and internal home addresses only using firestarter. would this be an option for you? On 28 August 2010 15:24, Matthew Macdonald-Wallace < matt...@truthisfreedom.org.uk> wrote: > Quoting "K.de Jong" : > > > If ssh is rarely used > > and you

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Matthew Macdonald-Wallace
Quoting "K.de Jong" : > If ssh is rarely used > and you have a running webserver > you could consider using ajaxterm > > you only listen to ssh on localhost > and have website that allows access to ssh > > this is slower and does not work well with remote ssh auth keys > but just another solution.

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread K.de Jong
If ssh is rarely used and you have a running webserver you could consider using ajaxterm you only listen to ssh on localhost and have website that allows access to ssh this is slower and does not work well with remote ssh auth keys but just another solution. and port knocking it opens access to

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Tyler J. Wagner
On Saturday 28 Aug 2010 08:05:03 Matthew Daubney wrote: > Denyhosts is quite useful in stopping brute force attacks. After so many > failed attempts it just blocks the attacking IP. See also fail2ban, which is in my opinion more useful. It works using iptables, and supports all kinds of brute-for

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Glen Mehn
You can't hide /etc/passwd because that's how the system translates userids into usernames (and thus how the system understands whether a user has access to a specific file or not) What you might consider is using non-password authenticated SSH sessions-- you can do this in /etc/sshd/sshd_con

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Matthew Macdonald-Wallace
Quoting Daniel Case : > Hi there, > > One of my servers has recently been attacked, it has one remote SSH user > which cannot run 'sudo', i made it like that so that if it was comprimized, > no-one would be able to do much. Switch to using keys instead of passwords, that way you can lock down w

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-28 Thread Matthew Daubney
On Sat, 2010-08-28 at 01:22 +0100, Daniel Case wrote: > Hi there, > > One of my servers has recently been attacked, it has one remote SSH > user which cannot run 'sudo', i made it like that so that if it was > comprimized, no-one would be able to do much. > > However, someone managed to gain the

Re: [ubuntu-uk] Preventing a hack attempt

2010-08-27 Thread Sean Miller
On 28 August 2010 01:22, Daniel Case wrote: > I need to know mainly how to stop the SSH user running su in the first place > and how to stop the user seeing files like /etc/passwd You could always rename su to something else, I suppose... I renamed "wget" to "webget" on one server because scripts

[ubuntu-uk] Preventing a hack attempt

2010-08-27 Thread Daniel Case
Hi there, One of my servers has recently been attacked, it has one remote SSH user which cannot run 'sudo', i made it like that so that if it was comprimized, no-one would be able to do much. However, someone managed to gain the password to that account on the server then used "vi /etc/passwd" to