Index: [Article Count Order] [Thread]

Date:  Fri, 15 Dec 2006 10:58:20 +1000 (EST)
From:  User Ernie <ernie (at mark) info.eis.net.au>
Subject:  [coba-e:08195] Re: Shell security
To:  coba-e (at mark) bluequartz.org
Message-Id:  <200612150058.kBF0wKbx069976 (at mark) info.eis.net.au>
In-Reply-To:  <45810D1A.5020306 (at mark) monostar.net>
X-Mail-Count: 08195


Funny you say that about telnet, when I look at the unauthorized access
attempts in the logs on my servers I see thousands for SSH and virtually no
attempts for telnet.

Shame about the chroot, that's a major secuirty issue, I guess that it's 
lucky 90% of our sites don't have shell access.

- Ernie.

> 
> > I just had the web developer for one of the virtual sites tell me that when
> > he telnets into the BQ server he can roam around all the other sites and
> > look at their files etc. Is the shell environment on BQ logins meant to be
> > sandboxed/chroot for security purposes?
> 
> First of all, turn off telnet immediately and only use SSH.
> 
> Second, nope, the logins are not chrooted.
> 
> /Kristian
> 
>