LinuxQuestions.org
Help answer threads with 0 replies.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 06-28-2016, 09:57 AM   #1
QWE123
Member
 
Registered: Nov 2014
Posts: 49

Rep: Reputation: Disabled
Access control


I use Redhat 6.5 server , I just would like to check the security issue of this service .

I know ssh , ftp , telnet is the typical services to remote access method to access the server , may I know is there other method could be used to access from remote , how can I check is there any service is opened for remote access ?

thanks
 
Old 06-28-2016, 10:03 AM   #2
Emerson
LQ Guru
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~arch
Posts: 5,959

Rep: Reputation: Disabled
You definitely do not want run telnet server, it is as insecure as it gets. Telnet client may be useful to probe ports/daemons.
 
Old 06-28-2016, 10:47 AM   #3
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 8,148
Blog Entries: 4

Rep: Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716
I would say, quite bluntly, that you should first(!) set up OpenVPN ... with unique digital certificates, not passwords == PSKs ... and to arrange for all other services to "listen" only to it, so that there are no other ports open. (And, as I describe in my thread about "Dwarvish Doors" on the Security forum, you can conceal the fact that it is open.)

Authorized users, having first connected via VPN, can then use other services like SSH.

Unauthorized users and "kiddies" find: "nothing." Even if they can detect that the port exists, they can't get through it no matter how hard they try. (Even if they steal a laptop, that certificate can be made to drop dead.) There is "a smooth, impenetrable, featureless wall."
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Access Control mikedelo Linux - Security 3 05-03-2014 04:06 AM
Attribute Based Access Control (ABAC): NIST Guide Aims to Ease Access Control tronayne Linux - Security 0 03-09-2014 06:44 PM
Access control with access.conf file custangro Linux - Enterprise 4 06-02-2009 11:22 AM
Access Control Issue clarket Linux - Networking 16 06-22-2006 07:41 AM
Access Control Firewall Trano Linux - Networking 3 02-23-2005 08:08 AM


All times are GMT -5. The time now is 12:09 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration