Original Announcement of SSH-Only Policy
Greetings, Duke Statistics colleague- I apologize in advance for the length of this note; however, due to the nature of the changes, I feel it necessary to send along as much information as possible. As of 17:00 EDT on Friday July 16, Duke Statistics will no longer be accessible by telnet, rlogin, rsh, rcp, and authenticated ftp. In order to access your account and transfer data, you will need to use the secure shell (ssh). This measure is being taken due to the recent root-level compromise of an Duke Statistics machine in which the hacker used the identity of a legitimate Duke Statistics user to carry out the initial attack. The account was compromised since the userid, password, and Duke Statistics machine name were all intercepted off an ACPUB machine by a hacker watching and collecting the plain text authentication from the network. I would also strongly advise people to change their passwords (see the discussion of passwords below) as a result of this latest incident as a precaution. Please do not view this as a punitive measure but rather a prudent step toward protecting and maintaining the computing environment in the department in face of certain realities of the current Internet. The majority of hackers do their bidding using the identity of legitimate users (you) to exploit known security problems on either your machine or simply using your account carry attacks against other sites for fun, spite, or criminal/political purposes. By providing an encrypted session between the client and server, ssh helps to prevent the all important first step of identity theft. I will be putting together some web resources to help ease the transition. http://www.stat.duke.edu/~sto/security/ssh.html will be up and running before the deadline listed above. The following Questions and Answers should help get you started (and will be on the web page): Q: Why should I care? I don't have anything of interest. A: The user is the single most important part in maintaining a healthy and secure network because you, through your actions, effectively determine the security of the _entire_ network. Or as the old saying goes, "a chain is only as strong as its weakest link". Your actions help to prevent: data loss, loss or degradation of departmental computing resources (e.g, machines having to be re-installed or being held by subpoena), or potentially exposing Duke Statistics and/or Duke University to legal action by damaged parties or the FBI (in extreme cases). Q: If ssh is so great, do I still need a good password? A: YES! SSH only does so much. UNIX security is predicated on good passwords and common sense. So please don't share your passwords and change them every 3 to 6 months. And probably the most important thing you can do is to have a different password for each system (Duke Statistics, ACPUB, etc) that you have access to. A good password should be: easy to type, easy to remember for you, hard to guess or crack. It should be 6 to 8 characters long and contain at least two non-alphabetical characters, unusual capitalization, misspellings, characters/symbols, etc. horrible password: hotdog better password: H0t!daWg alternatively you can use a phrase to generate a password I Love To Eat Hotdogs Everyday. iltehe -> Il2e!E Q: How do I change my password? A: Use the yppasswd command on any Duke Statistics Unix machine. Preferably, run this command only on the console or from a direct ssh connection (ie, telneting to godzilla.acpub and then ssh'ing to the department is NOT secure). Q: Where do I get ssh? A: Unix Source code is available for download from numerous sites, see the canonical site, ftp://ftp.cs.hut.fi/pub/ssh. SSH is available on all of the Duke Statistics and ACPUB Unix machines (and all well-administered/supported machines on campus). If the machine you are using does not have ssh, you should consider the machine abandoned and not safe to use. For Win32 machines (Win95, WinNT, Win98), 1) teraterm + ttssh teraterm> http://hp.vector.co.jp/authors/VA002416/teraterm.html ttssh> http://www.zip.com.au/~roca/ttssh.html 3) SecureCRT, available for $20.00 through OIT site license http://www.oit.duke.edu/site/html/body_secure_crt.html 4) F-secure for Windows by Datafellows (commercial) http://www.datafellows.com/products/cryptography/f-sshtt.htm Macintosh: 1) NiftyTelnet http://www.lysator.liu.se/~jonasw/freeware.html 2) F-secure for Macintosh (commercial) http://www.datafellows.com/products/cryptography/f-sshtt.htm For a more complete listing: http://www.employees.org/~satch/ssh/faq/ssh-faq-3.html#ss3.8 Q: Where can I get more information on SSH? A: I recommend the SSH FAQ page, http://www.employees.org/~satch/ssh/faq/ and http://www.ssh.org/ Q: How do I use ssh to transfer files? A: If you are using Unix, there are two options: 1) use scp scp myfile isdsmachine: (put myfile in your isds home directory) scp myfile isdsmachine:dir1 (put myfile into directory dir1) scp isdsmachine:myfile . (copy myfile from your isds account) scp -r isdsmachine:mydir . (copy directory from your isds account) 2) Take advantage of the ability of ssh to do port forwarding: ssh -L 4444:localhost:21 isdsmachine ftp localhost 4444 If you are using ttsh, there are two options: 1) Setup port forwarding and use your favorite Windows ftp client. See, the SecureFTP discussion at http://www.aas.duke.edu/comp/documentation/config/ttssh.html 2) Use the zmodem protocol under the file transfer (untested). If you are using niftytelnet for Macintosh, it includes the scp functionality. Q: How do I connect if my userid is different on the remote system? A: ssh -l remotename remotehost scp remotename@remotehost:file . Q: What if I am off in the "boonies" without ssh? A: The useful parts of ttssh (for Win32 platforms) will fit on a 1.44MB floppy. The clients for Macintosh, Win32 and Unix are freely available for download all over the planet.