On Thu, Mar 20, 2014 at 09:26:18AM -0500, Kenton Brede wrote:
> Years ago when I started administering linux boxes, some of our boxes had
> sshd open to the world.  So I devised kind of "poor person's" two-factor
> password authentication.  It worked like this:
> 
> admin1: could login to the system and su only to admin1ad.
> admin1ad: could not login, could su to root.
> 
> Currently for all of our boxes, port 22 is behind a VPN.  Some of us are
> using ssh keys for the initial login but password authentication is still
> enabled.
> 
> I'm thinking about disabling password auth, using keys only and
> passwordless sudo access.  Everyone would just have one user account.  It
> sounds like at some point we'll be moving to two-factor for our VPN.
> 
> Is this pretty much standard practice these days?  Is it reasonably
> secure?  If not, how are you all handling ssh authentication?

We keep the overall network behind a firewall. There are two boxes that
you can ssh into from the outside world.

Each of these login boxes has password authentication disabled, and
an AllowUsers line that strictly limits who can access it. root is not
allowed. End users do not know their own passwords on this box (although
sysadmins do). End users can set up tunnels, and the login box provides
a proxy on 127.0.0.127 that can be used to access internal resources
through an SSH tunnel.

When we have to let an employee go, we disable their keys on the login
boxes and change their mail passwords, and they no longer have access
to anything from the outside. Then we run our cleanup procedures without
worrying about a race against the clock.

-dsr-
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to