View previous topic :: View next topic |
Author |
Message |
ctl n00b

Joined: 05 Mar 2009 Posts: 16
|
Posted: Sat Mar 21, 2009 3:43 pm Post subject: Secure file sharing over internet? |
|
|
Hi, I have a server that I want to use to share files with users over the internet. The users will be using Linux, Windows, or Mac OS X, and I want them to have write access.
I was planning on using Samba, but I've read that it's a bad idea to use Samba over the internet for security reasons. What is the best software/protocol to achieve this?
Thanks |
|
Back to top |
|
 |
Kulfaangaren! Apprentice

Joined: 11 Jan 2003 Posts: 176 Location: Borås, Sweden
|
|
Back to top |
|
 |
neonknight Guru


Joined: 19 Jul 2003 Posts: 357 Location: Zurich, Switzerland
|
Posted: Sat Mar 21, 2009 7:15 pm Post subject: |
|
|
Maybe you also want to take a look at webdav or ftp, as they can be handled by every of the mentioned operating systems without installing additional software on the client side. Another argument is of course the easy implementation of SSL, which secures transmission of passwords and data over the internet.
You could also use Samba over an OpenVPN-tunnel, but the Samba-connection might not be stable enough over a low-speed/high-latency internet path. |
|
Back to top |
|
 |
TheAbu Apprentice

Joined: 08 Jun 2008 Posts: 160 Location: Lyon, France
|
Posted: Sat Mar 21, 2009 8:25 pm Post subject: |
|
|
I would say, one of the most secure way to do that would be vsftpd, allowing only SSL connection, with virtual user to limit what can be done on your computer (no shell access, no real account on your machine). Safe enough to stop everyone but a very motivated (and skilled) hacker. _________________ "Please, forgive my bad English"
Gentoo made me love using my computer again. Thank you to the Gentoo devs and more generally to all the people who makes GNU/Linux possible  |
|
Back to top |
|
 |
ewaller Apprentice


Joined: 11 Aug 2005 Posts: 264 Location: Pasadena, CA
|
Posted: Sat Mar 21, 2009 9:10 pm Post subject: |
|
|
I agree with TheAbu. You can go one better by handing your clients the keys rather than automatically exchanging them on the first connection.
Don't use Samba. I allow it on my home network -- behind the firewall. It is blocked in both directions at the router. _________________ Nothing is too wonderful to be true, if it be consistent with the laws of nature -- Michael Faraday |
|
Back to top |
|
 |
Kulfaangaren! Apprentice

Joined: 11 Jan 2003 Posts: 176 Location: Borås, Sweden
|
Posted: Sat Apr 11, 2009 4:06 pm Post subject: |
|
|
The title said "secure filetransfer" so I would not suggest FTP-S (not to be confused with SFTP), SSL encrypted ftp, which is what the above posts seem to suggest.
The difference is that FTP-S usually only encrypts the command channel (commands and directory listings) leaving the data unencrypted which people can still sniff/intercept.
I still suggest SFTP as the best alternative. Many FTP (Linux/Windows/MacOS X) clients also supports SFTP and all traffic is encrypted, both data and commands.
// Fredrik _________________ Please add [SOLVED] to the subject of your original post when you feel that your problem is resolved.
Join the 'adopt an unanswered post' initiative today |
|
Back to top |
|
 |
magic919 Advocate

Joined: 17 Jun 2005 Posts: 2182 Location: Berkshire, UK
|
Posted: Sat Apr 11, 2009 4:49 pm Post subject: |
|
|
Worth adding that FTPS can encrypt the data channel too. |
|
Back to top |
|
 |
Kulfaangaren! Apprentice

Joined: 11 Jan 2003 Posts: 176 Location: Borås, Sweden
|
Posted: Sun Apr 12, 2009 1:15 am Post subject: |
|
|
magic919 wrote: | Worth adding that FTPS can encrypt the data channel too. |
Yes, that is correct but it requires specialized server and client. The normal mode (as far as I know) is to encrypt only the command channel.
He wanted an OS agnostic (is that the right word?) solution and SFTP is a simple way of encrypting file transfer traffic that is available on all OSes both as server and client.
// Fredrik _________________ Please add [SOLVED] to the subject of your original post when you feel that your problem is resolved.
Join the 'adopt an unanswered post' initiative today |
|
Back to top |
|
 |
malern Apprentice


Joined: 19 Oct 2006 Posts: 170
|
Posted: Wed Apr 15, 2009 11:03 am Post subject: |
|
|
The latest version of OpenSSH can do restricted sftp by itself without needing any patches or things like scponly
I've set it up on my machine by adding the following to /etc/ssh/sshd_config
Code: | Match Group ftpusers
X11Forwarding no
AllowTcpForwarding no
ChrootDirectory /var/ftpincoming
ForceCommand internal-sftp |
Basically it restricts all users in the "ftpusers" group to sftp only (i.e. no real shell access or forwarding), and chroots them in the /var/ftpincoming dir. You'd have to create the group and dir first, but nothing else is needed. |
|
Back to top |
|
 |
Kulfaangaren! Apprentice

Joined: 11 Jan 2003 Posts: 176 Location: Borås, Sweden
|
|
Back to top |
|
 |
ibasaw Tux's lil' helper

Joined: 27 Aug 2006 Posts: 130 Location: France
|
Posted: Thu Jun 17, 2010 1:36 pm Post subject: |
|
|
hi
Whan i do this
malern wrote: | The latest version of OpenSSH can do restricted sftp by itself without needing any patches or things like scponly
I've set it up on my machine by adding the following to /etc/ssh/sshd_config
Code: | Match Group ftpusers
X11Forwarding no
AllowTcpForwarding no
ChrootDirectory /var/ftpincoming
ForceCommand internal-sftp |
Basically it restricts all users in the "ftpusers" group to sftp only (i.e. no real shell access or forwarding), and chroots them in the /var/ftpincoming dir. You'd have to create the group and dir first, but nothing else is needed. |
i got an error on the client: sftp is not supported
How to resolve this
Thanks |
|
Back to top |
|
 |
Kulfaangaren! Apprentice

Joined: 11 Jan 2003 Posts: 176 Location: Borås, Sweden
|
Posted: Thu Jun 17, 2010 1:50 pm Post subject: |
|
|
ZuckBin wrote: | hi
----- 8< Snipp! Snipp! >8 -----
i got an error on the client: sftp is not supported
How to resolve this
Thanks |
Please do not abreviate error messages.
Please post log entries and relevant console output in code-tags and we will try to help.
Cheers
// Fredrik _________________ Please add [SOLVED] to the subject of your original post when you feel that your problem is resolved.
Join the 'adopt an unanswered post' initiative today |
|
Back to top |
|
 |
depontius Advocate

Joined: 05 May 2004 Posts: 3530
|
Posted: Thu Jun 17, 2010 1:50 pm Post subject: |
|
|
malern wrote: | The latest version of OpenSSH can do restricted sftp by itself without needing any patches or things like scponly
I've set it up on my machine by adding the following to /etc/ssh/sshd_config
Code: | Match Group ftpusers
X11Forwarding no
AllowTcpForwarding no
ChrootDirectory /var/ftpincoming
ForceCommand internal-sftp |
Basically it restricts all users in the "ftpusers" group to sftp only (i.e. no real shell access or forwarding), and chroots them in the /var/ftpincoming dir. You'd have to create the group and dir first, but nothing else is needed. |
Slightly off-topic, but this comes close to something I'd like to do.
I'd like to use an account for TcpForwarding ONLY, no shell, no sftp. I've tried several ways to do this, without luck, though I have limited time. Do you already know how to do such a thing? _________________ .sigs waste space and bandwidth |
|
Back to top |
|
 |
malern Apprentice


Joined: 19 Oct 2006 Posts: 170
|
Posted: Thu Jun 17, 2010 2:52 pm Post subject: |
|
|
depontius wrote: | I'd like to use an account for TcpForwarding ONLY, no shell, no sftp. I've tried several ways to do this, without luck, though I have limited time. Do you already know how to do such a thing? |
What I use is;
Code: | Match User tunnel
X11Forwarding no
AllowTcpForwarding yes
ForceCommand /sbin/nologin |
On the client you have to add the "-N" switch to ssh which will stop it trying to execute a remote command (which would make it exit straight away). |
|
Back to top |
|
 |
depontius Advocate

Joined: 05 May 2004 Posts: 3530
|
Posted: Thu Jun 17, 2010 7:18 pm Post subject: |
|
|
Interesting... I've tried it, and so far it didn't work. I think part of the problem is that I've tried to have an "integrated AFS login" so that part isn't letting me get in without a password. Of course the integrated AFS login has never worked with ssh anyway, but I've got the hooks in system-auth. I need to revisit this. _________________ .sigs waste space and bandwidth |
|
Back to top |
|
 |
|