[13840] in bugtraq

home help back first fref pref prev next nref lref last post

Re: sshd and pop/ftponly users incorrect configuration

daemon@ATHENA.MIT.EDU (CDI)
Tue Feb 15 15:52:40 2000

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.3.95.1000214142352.22941A-100000@animal.blarg.net>
Date:         Mon, 14 Feb 2000 14:26:51 -0800
Reply-To: CDI <cdi@THEWEBMASTERS.NET>
From: CDI <cdi@THEWEBMASTERS.NET>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.10002111717370.27486-100000@vulcan.alphanet.ch>

On Fri, 11 Feb 2000, Marc SCHAEFER wrote:

> NAME
>    sshd-restricted-users-incorrect-configuration
>

[snip]

> IMMUNE CONFIGURATIONS
>    You are immune to this problem if one (or more) of the following
>    is true:
>
>       - the group(s) where those users belong to is listed in
>         /etc/ssh/sshd_config or equivalent configuration file as
>            DenyGroups group1 group2  # etc
>         (this is the recommended setup)

Just a quick note - it's much more accurate (not to mention secure) to use
'AllowGroups' rather than DenyGroups. If AllowGroups is set, then only if
a users primary group matches one of the specified group names are they
permitted to complete a connection attempt.

____________________________________
The Web Master's Net
http://www.thewebmasters.net/
Today's Excuse:
Someone is standing on the ethernet cable, causeing a kink in the cable

home help back first fref pref prev next nref lref last post