<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Secure Remote Access from Your Desktop</title>
	<atom:link href="http://www.linux-mag.com/id/4523/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linux-mag.com/id/4523/</link>
	<description>Open Source, Open Standards</description>
	<lastBuildDate>Sat, 05 Oct 2013 13:48:18 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: mbaker1020</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4882</link>
		<dc:creator>mbaker1020</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4882</guid>
		<description>Thanks - clear and to the point</description>
		<content:encoded><![CDATA[<p>Thanks &#8211; clear and to the point</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: donatello</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4883</link>
		<dc:creator>donatello</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4883</guid>
		<description>Most home networks that connect to the internet via broadband ISPs (at least in India) these days seem to be behind IP masquerading gateways. So, there is no real way to connect to connect to your home network right?</description>
		<content:encoded><![CDATA[<p>Most home networks that connect to the internet via broadband ISPs (at least in India) these days seem to be behind IP masquerading gateways. So, there is no real way to connect to connect to your home network right?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: tirili</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4884</link>
		<dc:creator>tirili</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4884</guid>
		<description>donatello, if you look at my article at &lt;a href=&quot;http://inhalt.serviert.de/wissen/security/ssh/reverse_tunnel&quot; rel=&quot;nofollow&quot;&gt;inhalt.serviert.de&lt;/a&gt;&lt;br /&gt;
you see that this might not be a restriction if you use the feature of SSH Reverse Tunneling.&lt;br /&gt;
Any further Questions via &lt;a href=&quot;www.tiri.li&quot; rel=&quot;nofollow&quot;&gt;tiri.li - our company&lt;/a&gt;.</description>
		<content:encoded><![CDATA[<p>donatello, if you look at my article at <a href="http://inhalt.serviert.de/wissen/security/ssh/reverse_tunnel" rel="nofollow">inhalt.serviert.de</a><br />
you see that this might not be a restriction if you use the feature of SSH Reverse Tunneling.<br />
Any further Questions via <a href="www.tiri.li" rel="nofollow">tiri.li &#8211; our company</a>.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: gsruiz</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4885</link>
		<dc:creator>gsruiz</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4885</guid>
		<description>To prevent brute force attacks on the SSH server, I would recommend to change the default port 22 to something like, for example, port 2002. Also, you need to make sure that root access is disabled via ssh and use public/private key pair authentication instead of encrypted plain passwords to access the server remotely... My two cents...</description>
		<content:encoded><![CDATA[<p>To prevent brute force attacks on the SSH server, I would recommend to change the default port 22 to something like, for example, port 2002. Also, you need to make sure that root access is disabled via ssh and use public/private key pair authentication instead of encrypted plain passwords to access the server remotely&#8230; My two cents&#8230;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: sigmon</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4886</link>
		<dc:creator>sigmon</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4886</guid>
		<description>When I allow SSH into by Debian box every once in a while, it only takes 8 hours before the brute force attacks show up. I&#039;d very very learly opening up 22. I like the idea of changing the port to something else. The bad guys will eventually find it, but if you only need it for a couple of days.....</description>
		<content:encoded><![CDATA[<p>When I allow SSH into by Debian box every once in a while, it only takes 8 hours before the brute force attacks show up. I&#8217;d very very learly opening up 22. I like the idea of changing the port to something else. The bad guys will eventually find it, but if you only need it for a couple of days&#8230;..</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: srart</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4887</link>
		<dc:creator>srart</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4887</guid>
		<description>for you folks with brute force attacks on you ssh servers, try a nice little program called denyhosts it&#039;s a python program, very easy to setup, and it&#039;s aptitude (or apt-get) gettable from debian&#039;s main repository&lt;br /&gt;
&lt;br /&gt;
Description: an utility to help sys admins thwart ssh hackers&lt;br /&gt;
 DenyHosts is a program that automatically blocks ssh brute-force attacks by&lt;br /&gt;
 adding entries to /etc/hosts.deny. It will also inform Linux administrators&lt;br /&gt;
 about offending hosts, attacked users and suspicious logins. &lt;br /&gt;
 &lt;br /&gt;
 Syncronization with a central server is possible too. &lt;br /&gt;
 &lt;br /&gt;
 Differently from other software that do same work, denyhosts doesn&#039;t need&lt;br /&gt;
 support for packet filtering or any other kind of firewall in your kernel&lt;br /&gt;
&lt;br /&gt;
Tags: admin::configuring, admin::logging, implemented-in::python,&lt;br /&gt;
      interface::daemon, protocol::ssh, role::program, scope::utility,&lt;br /&gt;
      security::forensics</description>
		<content:encoded><![CDATA[<p>for you folks with brute force attacks on you ssh servers, try a nice little program called denyhosts it&#8217;s a python program, very easy to setup, and it&#8217;s aptitude (or apt-get) gettable from debian&#8217;s main repository</p>
<p>Description: an utility to help sys admins thwart ssh hackers<br />
 DenyHosts is a program that automatically blocks ssh brute-force attacks by<br />
 adding entries to /etc/hosts.deny. It will also inform Linux administrators<br />
 about offending hosts, attacked users and suspicious logins. </p>
<p> Syncronization with a central server is possible too. </p>
<p> Differently from other software that do same work, denyhosts doesn&#8217;t need<br />
 support for packet filtering or any other kind of firewall in your kernel</p>
<p>Tags: admin::configuring, admin::logging, implemented-in::python,<br />
      interface::daemon, protocol::ssh, role::program, scope::utility,<br />
      security::forensics</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: geertvc</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4888</link>
		<dc:creator>geertvc</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4888</guid>
		<description>Title of Figure Three should be:&lt;br /&gt;
&lt;br /&gt;
&quot;How to configure a session in Putty&quot;, not &quot;FreeNx&quot;.&lt;br /&gt;
&lt;br /&gt;
Next to this, it would have been nice if there was also explained how to set up a public/private key using Putty and Puttygen (the app from the Putty suite that allows you to generate both the private and public keys).&lt;br /&gt;
&lt;br /&gt;
Otherwise, nice article and overview!</description>
		<content:encoded><![CDATA[<p>Title of Figure Three should be:</p>
<p>&#8220;How to configure a session in Putty&#8221;, not &#8220;FreeNx&#8221;.</p>
<p>Next to this, it would have been nice if there was also explained how to set up a public/private key using Putty and Puttygen (the app from the Putty suite that allows you to generate both the private and public keys).</p>
<p>Otherwise, nice article and overview!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: xjlittle</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4889</link>
		<dc:creator>xjlittle</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4889</guid>
		<description>donatello,&lt;br /&gt;
&lt;br /&gt;
I am firewalled with masquerading using iptables.  Most firewalls allow port forwarding.  Simply forward the ssh port that you are using to the ssh server to which you want to connect. That way you can log into your network and then ssh to any of the other computers that you need to access.</description>
		<content:encoded><![CDATA[<p>donatello,</p>
<p>I am firewalled with masquerading using iptables.  Most firewalls allow port forwarding.  Simply forward the ssh port that you are using to the ssh server to which you want to connect. That way you can log into your network and then ssh to any of the other computers that you need to access.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: wcw</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4890</link>
		<dc:creator>wcw</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4890</guid>
		<description>Thanks! It&#039;s very useful.</description>
		<content:encoded><![CDATA[<p>Thanks! It&#8217;s very useful.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: kuri0s</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4891</link>
		<dc:creator>kuri0s</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4891</guid>
		<description>Hi,&lt;br /&gt;
&lt;br /&gt;
About changing the port number... Is there a real threat in brute-force atacks trhough ssh? I mean if you have a strong md5 password, nobody knows your username and root access is denied... By the other side, unless you have tons of ports opened (which is the least probable in a secured system) you can figure out the ssh port in less than a minute. In my opinion, that is pointless.&lt;br /&gt;
&lt;br /&gt;
By the way, I use&lt;br /&gt;
&lt;br /&gt;
x11vnc -usepw -display :0&lt;br /&gt;
&lt;br /&gt;
to stablish a tunneled vnc connection to my default KDM opened X-session.&lt;br /&gt;
&lt;br /&gt;
Thank you, very nice article.</description>
		<content:encoded><![CDATA[<p>Hi,</p>
<p>About changing the port number&#8230; Is there a real threat in brute-force atacks trhough ssh? I mean if you have a strong md5 password, nobody knows your username and root access is denied&#8230; By the other side, unless you have tons of ports opened (which is the least probable in a secured system) you can figure out the ssh port in less than a minute. In my opinion, that is pointless.</p>
<p>By the way, I use</p>
<p>x11vnc -usepw -display :0</p>
<p>to stablish a tunneled vnc connection to my default KDM opened X-session.</p>
<p>Thank you, very nice article.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: yossis</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4892</link>
		<dc:creator>yossis</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4892</guid>
		<description>Thx All Very Useful</description>
		<content:encoded><![CDATA[<p>Thx All Very Useful</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: verinux</title>
		<link>http://www.linux-mag.com/id/4523/#comment-4893</link>
		<dc:creator>verinux</dc:creator>
		<pubDate>Wed, 30 Nov -0001 00:00:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.linux-mag.com/id/4523/#comment-4893</guid>
		<description>Here is the script that I use to connect to my client.&lt;br /&gt;
&lt;br /&gt;
#!/bin/sh&lt;br /&gt;
&lt;br /&gt;
# $REMOTE_HOST is the name of the remote system&lt;br /&gt;
CLIENT=linux.client.com&lt;br /&gt;
&lt;br /&gt;
# $REMOTE_PORT is the remote port number that will be used to tunnel&lt;br /&gt;
# back to this system&lt;br /&gt;
REMOTE_PORT=5000&lt;br /&gt;
&lt;br /&gt;
# $COMMAND is the command used to create the reverse ssh tunnel&lt;br /&gt;
COMMAND=&quot;ssh -N -R $REMOTE_PORT:localhost:22 $CLIENT&quot;&lt;br /&gt;
&lt;br /&gt;
# Is the tunnel up? Perform two tests:&lt;br /&gt;
&lt;br /&gt;
# 1. Check for relevant process ($COMMAND)&lt;br /&gt;
pgrep -f -x &quot;$COMMAND&quot; &#124;&#124; $COMMAND&lt;br /&gt;
&lt;br /&gt;
# 2. Test tunnel by looking at &quot;netstat&quot; output on $CLIENT&lt;br /&gt;
ssh $CLIENT netstat -an &#124; egrep &quot;tcp.*:$CLIENT.*LISTEN&quot; \&lt;br /&gt;
   &gt; /dev/null 2&gt;&amp;1&lt;br /&gt;
if [ $? -ne 0 ] ; then&lt;br /&gt;
   pkill -f -x &quot;$COMMAND&quot;&lt;br /&gt;
   $COMMAND&lt;br /&gt;
fi</description>
		<content:encoded><![CDATA[<p>Here is the script that I use to connect to my client.</p>
<p>#!/bin/sh</p>
<p># $REMOTE_HOST is the name of the remote system<br />
CLIENT=linux.client.com</p>
<p># $REMOTE_PORT is the remote port number that will be used to tunnel<br />
# back to this system<br />
REMOTE_PORT=5000</p>
<p># $COMMAND is the command used to create the reverse ssh tunnel<br />
COMMAND=&#8221;ssh -N -R $REMOTE_PORT:localhost:22 $CLIENT&#8221;</p>
<p># Is the tunnel up? Perform two tests:</p>
<p># 1. Check for relevant process ($COMMAND)<br />
pgrep -f -x &#8220;$COMMAND&#8221; || $COMMAND</p>
<p># 2. Test tunnel by looking at &#8220;netstat&#8221; output on $CLIENT<br />
ssh $CLIENT netstat -an | egrep &#8220;tcp.*:$CLIENT.*LISTEN&#8221; \<br />
   &gt; /dev/null 2&gt;&amp;1<br />
if [ $? -ne 0 ] ; then<br />
   pkill -f -x &#8220;$COMMAND&#8221;<br />
   $COMMAND<br />
fi</p>
]]></content:encoded>
	</item>
</channel>
</rss>