* SSH allow only form selected IP'
@ 2004-08-14 10:34 Kev
2004-08-14 10:54 ` James Turnbull
0 siblings, 1 reply; 10+ messages in thread
From: Kev @ 2004-08-14 10:34 UTC (permalink / raw)
To: linux-admin, linux-config
hi,
i have a redhat enterprise 3 linux box, how can i configure SSH demon
only to allow SSH connections only form selected IP's ?
i have 3 IP rangers that i need to allow, how can i do this ?
thanks a lot
Kev
-------
Web Hosting at a cheap price, starting at $1 per month with your own domain, .COM, .NET, .LK, .ORG etc..
PHP, CGI, Perl, MySQL, Cpanel 9, POP3, POP3s, SMTP, IMAP, FTP,
http://www.orbitsl.net
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: SSH allow only form selected IP'
2004-08-14 10:34 SSH allow only form selected IP' Kev
@ 2004-08-14 10:54 ` James Turnbull
2004-08-14 11:18 ` Re[2]: " Kev
0 siblings, 1 reply; 10+ messages in thread
From: James Turnbull @ 2004-08-14 10:54 UTC (permalink / raw)
To: Kev; +Cc: linux-admin, linux-config
[-- Attachment #1: Type: text/plain, Size: 960 bytes --]
Kev wrote:
>hi,
>
>i have a redhat enterprise 3 linux box, how can i configure SSH demon
>only to allow SSH connections only form selected IP's ?
>
>i have 3 IP rangers that i need to allow, how can i do this ?
>
>thanks a lot
>Kev
>
>
>-------
>Web Hosting at a cheap price, starting at $1 per month with your own domain, .COM, .NET, .LK, .ORG etc..
>PHP, CGI, Perl, MySQL, Cpanel 9, POP3, POP3s, SMTP, IMAP, FTP,
>http://www.orbitsl.net
>
>-
>To unsubscribe from this list: send the line "unsubscribe linux-config" in
>the body of a message to majordomo@vger.kernel.org
>More majordomo info at http://vger.kernel.org/majordomo-info.html
>
>
Use your firewall rules. Something like:
iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
192.168.0.0/24 --dport 22 -j ACCEPT
iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
192.168.0.0/24 --sport 22 -j ACCEPT
Where 192.168.0.0/24 is the range you are allowing.
Regards
James
[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/x-pkcs7-signature, Size: 2801 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re[2]: SSH allow only form selected IP'
2004-08-14 10:54 ` James Turnbull
@ 2004-08-14 11:18 ` Kev
2004-08-14 11:42 ` James Turnbull
2004-08-14 11:46 ` James Turnbull
0 siblings, 2 replies; 10+ messages in thread
From: Kev @ 2004-08-14 11:18 UTC (permalink / raw)
To: linux-admin, linux-config
>>
>>i have a redhat enterprise 3 linux box, how can i configure SSH demon
>>only to allow SSH connections only form selected IP's ?
>>
>>i have 3 IP rangers that i need to allow, how can i do this ?
>>
>>thanks a lot
>>Kev
>
>>
>Use your firewall rules. Something like:
>
>iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
>192.168.0.0/24 --dport 22 -j ACCEPT
>iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
>192.168.0.0/24 --sport 22 -j ACCEPT
>
>Where 192.168.0.0/24 is the range you are allowing.
anyway i can do this with the SSH config ?
i can use the iptabel rules for 2-3 IP rangers ?
-------
Web Hosting at a cheap price, starting at $1 per month with your own domain, .COM, .NET, .LK, .ORG etc..
PHP, CGI, Perl, MySQL, Cpanel 9, POP3, POP3s, SMTP, IMAP, FTP,
http://www.orbitsl.net
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: SSH allow only form selected IP'
2004-08-14 11:18 ` Re[2]: " Kev
@ 2004-08-14 11:42 ` James Turnbull
2004-08-14 11:54 ` Re[2]: " Kev
2004-08-14 11:46 ` James Turnbull
1 sibling, 1 reply; 10+ messages in thread
From: James Turnbull @ 2004-08-14 11:42 UTC (permalink / raw)
To: Kev; +Cc: linux-admin, linux-config
[-- Attachment #1: Type: text/plain, Size: 987 bytes --]
Kev wrote:
>>e your firewall rules. Something like:
>>
>>iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
>>192.168.0.0/24 --dport 22 -j ACCEPT
>>iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
>>192.168.0.0/24 --sport 22 -j ACCEPT
>>
>>Where 192.168.0.0/24 is the range you are allowing.
>>
>>
>
>anyway i can do this with the SSH config ?
>
>i can use the iptabel rules for 2-3 IP rangers ?
>
>
Have a read of:
http://www.oreilly.com/catalog/sshtdg/chapter/ch08.html#45775
The firewall rules yes you can do more than one subnet:
iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
192.168.0.0/24 --dport 22 -j ACCEPT
iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
192.168.0.0/24 --sport 22 -j ACCEPT
iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
10.0.0.0/24 --dport 22 -j ACCEPT
iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
10.0.0.0/24 --sport 22 -j ACCEPT
etc etc
Regards
James
[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/x-pkcs7-signature, Size: 2801 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re[2]: SSH allow only form selected IP'
2004-08-14 11:42 ` James Turnbull
@ 2004-08-14 11:54 ` Kev
0 siblings, 0 replies; 10+ messages in thread
From: Kev @ 2004-08-14 11:54 UTC (permalink / raw)
To: linux-admin, linux-config
>>
>>anyway i can do this with the SSH config ?
>>
>>i can use the iptabel rules for 2-3 IP rangers ?
>>
>>
>Have a read of:
>http://www.oreilly.com/catalog/sshtdg/chapter/ch08.html#45775
>
>The firewall rules yes you can do more than one subnet:
>
>iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
>192.168.0.0/24 --dport 22 -j ACCEPT
>iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
>192.168.0.0/24 --sport 22 -j ACCEPT
>
>iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
>10.0.0.0/24 --dport 22 -j ACCEPT
>iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
>10.0.0.0/24 --sport 22 -j ACCEPT
>
thanks a lot James, its working fine.... thanks for the help.
-------
Web Hosting at a cheap price, starting at $1 per month with your own domain, .COM, .NET, .LK, .ORG etc..
PHP, CGI, Perl, MySQL, Cpanel 9, POP3, POP3s, SMTP, IMAP, FTP,
http://www.orbitsl.net
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: SSH allow only form selected IP'
2004-08-14 11:18 ` Re[2]: " Kev
2004-08-14 11:42 ` James Turnbull
@ 2004-08-14 11:46 ` James Turnbull
1 sibling, 0 replies; 10+ messages in thread
From: James Turnbull @ 2004-08-14 11:46 UTC (permalink / raw)
To: Kev; +Cc: linux-admin, linux-config
[-- Attachment #1: Type: text/plain, Size: 92 bytes --]
Kev wrote:
Sorry: http://www.oreilly.com/catalog/sshtdg/chapter/ch08.html
Regards
James
[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/x-pkcs7-signature, Size: 2801 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: Re[2]: SSH allow only form selected IP'
@ 2004-08-14 11:52 luke
2004-08-15 12:58 ` James Turnbull
0 siblings, 1 reply; 10+ messages in thread
From: luke @ 2004-08-14 11:52 UTC (permalink / raw)
To: linux-admin
One very effective way that I have found to do this is to use the
'hosts.allow' file located at /etc/hosts.allow
Openssh uses this to restrict or allow access to the server from IP,
host names, etc. Keep in mind that using this method can restrict
access to the server using ANY method. To retrict only SSH you must
them also ALLOW all other system methods.
For instance, to block access to the server from any IP except
216.12.214.217, but allow all IP's to access the server using ftp,
use this syntax:
-------------------------------
ALL : 216.12.214.217 : ALLOW
vsftpd : ALL
ALL : ALL : DENY
--------------------------------
basically, this says, allow 216.12.214.217 access of any kind. Allow
anyone to access using VSFTP. Deny all others.
One other important note: hosts.allow only blocks or allows access
to system services such as SSH, FTP, HTTPD, etc. This will not
restrict access to a non-standard service such as a game server or
chat software running on port 10000.
Luke
>>>
>>>i have a redhat enterprise 3 linux box, how can i configure SSH
>>> demon
>>>only to allow SSH connections only form selected IP's ?
>>>
>>>i have 3 IP rangers that i need to allow, how can i do this ?
>>>
>>>thanks a lot
>>>Kev
>>
>>>
>>Use your firewall rules. Something like:
>>
>>iptables -A INPUT -p tcp -m state --state NEW,ESTABLISHED -s
>>192.168.0.0/24 --dport 22 -j ACCEPT
>>iptables -A OUTPUT -p tcp -m state --state NEW,ESTABLISHED -d
>>192.168.0.0/24 --sport 22 -j ACCEPT
>>
>>Where 192.168.0.0/24 is the range you are allowing.
>
> anyway i can do this with the SSH config ?
>
> i can use the iptabel rules for 2-3 IP rangers ?
>
> -------
> Web Hosting at a cheap price, starting at $1 per month with your
own domain, .COM, .NET, .LK, .ORG etc..
> PHP, CGI, Perl, MySQL, Cpanel 9, POP3, POP3s, SMTP, IMAP, FTP,
> http://www.orbitsl.net
>
> -
> To unsubscribe from this list: send the line "unsubscribe
> linux-admin" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: SSH allow only form selected IP'
2004-08-14 11:52 Re[2]: " luke
@ 2004-08-15 12:58 ` James Turnbull
2004-08-15 14:59 ` luke
0 siblings, 1 reply; 10+ messages in thread
From: James Turnbull @ 2004-08-15 12:58 UTC (permalink / raw)
To: luke; +Cc: linux-admin
[-- Attachment #1: Type: text/plain, Size: 279 bytes --]
luke@techfreak.org wrote:
>One very effective way that I have found to do this is to use the
>'hosts.allow' file located at /etc/hosts.allow
>
>
>
hosts.allow is NOT secure. You can easily spoof the IP addresses
contained within it. You should not use it.
Regards
James
[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/x-pkcs7-signature, Size: 2801 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: SSH allow only form selected IP'
2004-08-15 12:58 ` James Turnbull
@ 2004-08-15 14:59 ` luke
2004-08-16 11:23 ` James Turnbull
0 siblings, 1 reply; 10+ messages in thread
From: luke @ 2004-08-15 14:59 UTC (permalink / raw)
To: linux-admin
I'm definitely not a firewall expert, but isn't it also possible to
get around
IPchains using IP spoofing? From what I know ipchains is only
protected against spoofing by using source address verification.
Or am I way off?
Luke
> luke@techfreak.org wrote:
>
>>One very effective way that I have found to do this is to use the
'hosts.allow' file located at /etc/hosts.allow
> hosts.allow is NOT secure. You can easily spoof the IP addresses
contained within it. You should not use it.
>
> Regards
>
> James
>
>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: SSH allow only form selected IP'
2004-08-15 14:59 ` luke
@ 2004-08-16 11:23 ` James Turnbull
2004-08-16 13:37 ` Re[2]: " Kev
0 siblings, 1 reply; 10+ messages in thread
From: James Turnbull @ 2004-08-16 11:23 UTC (permalink / raw)
To: luke; +Cc: linux-admin
[-- Attachment #1: Type: text/plain, Size: 547 bytes --]
luke@techfreak.org wrote:
>I'm definitely not a firewall expert, but isn't it also possible to
>get around
>IPchains using IP spoofing? From what I know ipchains is only
>protected against spoofing by using source address verification.
>
>Or am I way off?
>
>Luke
>
>
A little off. :) Yes you can spoof iptables but not nearly as easily as
hosts.allow can be spoofed. Hosts.allow's verifications procedures are
considerably less sophisticated than those of iptables.
Regards
James
P.S. Generally Ipchains has been replaced by Iptables.
[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/x-pkcs7-signature, Size: 2801 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re[2]: SSH allow only form selected IP'
2004-08-16 11:23 ` James Turnbull
@ 2004-08-16 13:37 ` Kev
2004-08-18 10:46 ` Stephen Samuel
0 siblings, 1 reply; 10+ messages in thread
From: Kev @ 2004-08-16 13:37 UTC (permalink / raw)
To: linux-admin
>
>>I'm definitely not a firewall expert, but isn't it also possible to
>>get around
>>IPchains using IP spoofing? From what I know ipchains is only
>>protected against spoofing by using source address verification.
>>
>>Or am I way off?
>>
>>Luke
>>
>>
>A little off. :) Yes you can spoof iptables but not nearly as easily as
>hosts.allow can be spoofed. Hosts.allow's verifications procedures are
>considerably less sophisticated than those of iptables.
>
>Regards
>
>James
>
>P.S. Generally Ipchains has been replaced by Iptables.
I did both, i blocked IP's with iptbels and i also configured SSH Demean
to only allow connections form given IP's
my server was down like 2-3 times a week due to DDOS attach or some one
running a attach on my SSH, now the server seem to be running fine.
oh yeah and i also blocked all ICMP communication and only allowed form
my IP only :)
-------
Web Hosting at a cheap price, starting at $1 per month with your own domain, .COM, .NET, .LK, .ORG etc..
PHP, CGI, Perl, MySQL, Cpanel 9, POP3, POP3s, SMTP, IMAP, FTP,
http://www.orbitsl.net
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: SSH allow only form selected IP'
2004-08-16 13:37 ` Re[2]: " Kev
@ 2004-08-18 10:46 ` Stephen Samuel
0 siblings, 0 replies; 10+ messages in thread
From: Stephen Samuel @ 2004-08-18 10:46 UTC (permalink / raw)
To: Kev, linux-admin
blocking using iptables is easily the most efficient if you're dealing
with a DDOS situation. It blocks at the kerrnel, so the opening packet
is never accepted and sshd is never called. Any other solution is
likely to require an open connection and a process to deal with things.
I actually can't find a way to get sshd to only allow certain hosts
by IP address. AllowHosts used to work, but seems to be missing fromm
the mosth recent sshd_config format
Kev wrote:
> I did both, i blocked IP's with iptbels and i also configured SSH Demean
> to only allow connections form given IP's
>
> my server was down like 2-3 times a week due to DDOS attach or some one
> running a attach on my SSH, now the server seem to be running fine.
>
> oh yeah and i also blocked all ICMP communication and only allowed form
> my IP only :)
--
Stephen Samuel +1(604)876-0426 samuel@bcgreen.com
http://www.bcgreen.com/~samuel/
Powerful committed communication. Transformation touching
the jewel within each person and bringing it to light.
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2004-08-18 10:46 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-08-14 10:34 SSH allow only form selected IP' Kev
2004-08-14 10:54 ` James Turnbull
2004-08-14 11:18 ` Re[2]: " Kev
2004-08-14 11:42 ` James Turnbull
2004-08-14 11:54 ` Re[2]: " Kev
2004-08-14 11:46 ` James Turnbull
-- strict thread matches above, loose matches on Subject: below --
2004-08-14 11:52 Re[2]: " luke
2004-08-15 12:58 ` James Turnbull
2004-08-15 14:59 ` luke
2004-08-16 11:23 ` James Turnbull
2004-08-16 13:37 ` Re[2]: " Kev
2004-08-18 10:46 ` Stephen Samuel
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).