home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.protocols.tcp-ip
- Path: sparky!uunet!spool.mu.edu!agate!dog.ee.lbl.gov!network.ucsd.edu!munnari.oz.au!uniwa!cujo!ncrpda.curtin.edu.au!rocky.curtin.edu.au!user
- From: peter@cujo.curtin.edu.au (Peter N Lewis)
- Subject: Re: Limiting Telnet access.
- Message-ID: <peter-211292130304@rocky.curtin.edu.au>
- Followup-To: comp.protocols.tcp-ip,comp.unix.bsd
- Lines: 45
- Sender: news@ncrpda.curtin.edu.au
- Nntp-Posting-Host: ncrpda.curtin.edu.au
- Organization: NCRPDA, Curtin University
- References: <1992Dec17.230214.16501@vector.dallas.tx.us>
- Date: Mon, 21 Dec 1992 05:15:08 GMT
-
- In article <1992Dec17.230214.16501@vector.dallas.tx.us>,
- tbo@vector.dallas.tx.us (Terry Bohaning) wrote:
- >
- > I've recently become very concerned about the security of many of
- > the Unix workstations under my care. Some of the users are overly
- > free with their passwords and I would really like to limit access
- > to the systems.
-
- Grab log_tcp. It will log all tcp connections, and deny access to
- certain sets of them (or all except certain sets) on an individual
- program basis (as long as the program is started via inetd). For
- example, my setup looks something like this:
-
- ALL : 123.4.567. : NOLOG
- in.identd : ALL : LOG
- in.ftpd : 123.4.789.80 : NOLOG
- gopherd in.ftpd in.telnetd in.rshd in.rlogind in.rexecd : 123.4.789.81
- 123.4.789.80 : LOG
- in.fingerd : ALL : LOG
- in.telnetd gopherd in.ftpd : ALL : LOG : /usr/ucb/finger -l @%a |
- /usr/ucb/mail -s "Warning, service %d requested by %h [%a]" root &
- ALL : ALL : DENY : /usr/ucb/finger -l @%a | /usr/ucb/mail -s "Warning,
- service %d requested by %h [%a]" root &
-
- So it allows all services from my logal domain without any logging (which
- helps keep the log file size down), logs all identd accesses, no logging of
- ftp accesses from a local machine, allows accesses from a few other local
- machines (with logging), logs all finger requests, logs all telnet, gopher
- and ftp requests and fingers the machine and sends a warning to root (but
- of course, all local accesses were previously dealt with, so this only
- happens for accesses from strange places), and deny all other access (and
- report the possible attack).
-
- BTW, the above includes extensions I made that havent been released to
- allow the NOLOG option, but the log_tcp package should do what you want
- anyway.
-
- Everyone should be running this, it gives you lots of early warnings, and
- totally cuts off a lot of potential attacks.
-
- Have fun all,
- Peter.
-
- _______________________________________________________________________
- Peter N Lewis <peter@cujo.curtin.edu.au> Ph: +61 9 368 2055
-