> Is there any easy way to setup SSH (and eliminate unencrypted telnet logins
> completely) in Red Hat 6.2? I was hoping for a "point and click" (so to
> speak) solution...
> My server is going to be for mild usage (5-10 users max, probably no more
> then 1 or 2 at any given time), but I want to make sure that it's as secure
> as possible and rock solid...
Oh! by the way, I don't really think you really want an "as secure as
possible and rock solid" system but due to your ignorance: You can't
get it on a point-and-click way (are you *rrrrrreally* ready to confy
your system to a program compiled by you-don't-know-who?) The only rock
solid, as secure as possible way to build a system is building yourself,
controlling both software and hardware, having a policy in place on how
the system is going to be used, and enforcing it, obviously having all
the needed knowlegde on how to achieve this, and time and resources to
maintain that stuff running on. Even then you will find your system is
pretty unusable due to any commodities being ripped off from it, and
finding that even the most simple tasks need an awfull amount of work to
get them done: let's take for instance what my three steps guide for
installing ssl/ssh becomes:
*Get the command from the SCM department to get this service in place
(you are the SCM department, but even then you will have to consider why
you need ssh, what the alternatives are, what the objectives are to be
reached when this new service is in place, and how are you going to
measure that those goals are indeed flawlessly acomplished, etc.)
*Review how this new service will interact with all the other services
in place.
*Get the source code.
*Review the source code.
*Get the RPM source code. (it includes pre and post install scripts that
must be reviewed).
*Compile the source RPM (not to mention how are you going to be
confident on gcc and other tools you need just to compile the SRPM)
*distribute it on a secure way (you don't have compiling/configuring
tools on a rock-solid box, do you?)
*Install it
*Test-case it
*Teach your users the proper way to use the new tool. Look for the way
to enforce that proper way (probably you will need further tools that
will go through this whole process too)
*Roll out the new service
*Track and monitorize how the system is running once it's on the
production environment
...
Now you know why so many systems (even sensible systems) become cracked.
--
SALUD,
Jess
***
***