Re: Security basics

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 04/10/2007, Tod Merley <todbot88@xxxxxxxxx> wrote:
> On 10/4/07, Alan M. Evans <fedoralist@xxxxxxxxxxxxx> wrote:
> > On Thu, 2007-10-04 at 00:26 +0100, Jonathan Underwood wrote:
> > > On 03/10/2007, Alan M. Evans <fedoralist@xxxxxxxxxxxxx> wrote:
> > > > Keep your SSH and your "real password" and sleep like a baby. As for me,
> > > > I won't trust SSH alone. I employ other methods, including rsa keys,
> > > > special iptables rules, and SELinux, to enhance the security of my
> > > > system. (For the record, I run SSH on the standard port, despite the
> > > > fact that I claim it would enhance security further.)
> > > >
> > >
> > > I'd be interested to know what SElinux policy changes you've
> > > implemented to add further security to sshd?
> >
> > None, actually. Sorry if I was misunderstood. I merely mentioned SELinux
> > because I'm aware that Karl doesn't think it's useful and I do because
> > of the "layered security" model that I was discussing. Karl was saying,
> > in effect, that SSH and a "good" password were enough, and that's why I
> > was mentioning layered security.
> >
> > In retrospect, it probably shouldn't have been lumped in with the rsa
> > keys and iptables rules.
> >
> > (Also, Karl may not have anything against SELinux. I just made that
> > statement without researching the list history because in my mind I
> > lumped him in with the cabal of anti-SELinux guys. That impression may
> > be incorrect.)
> >
> > --
> > fedora-list mailing list
> > fedora-list@xxxxxxxxxx
> > To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
> >
>
> Hi Alan!
>
> With SSH and similar popular connection tools I would like to see a
> utility which sets up a client on the machine seeking the connection
> which talks to a server on the machine being connected to.  The
> utility would use a customized "query / response" protocol on a
> non-standard port to turn on the connection tool (e.g. SSH) and
> establish that the connection to be made on a random non-standard port
> the identity of which is communicated by a custom encrypted packet.
>
> The original query to the server would need to be proper to illicit a
> response.  So, the keys to the box, and the location of the locks are
> only known to the user.
>
> Anyone already doing this?
>

I think you're describing port knocking - read

http://en.wikipedia.org/wiki/Port_knocking

and look at the links at the end.

J.

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux