<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict SSH Access to Management Station - R80.40 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95587#M7422</link>
    <description>&lt;P&gt;I guess depends a lot on the issue/bug itself - is it an OpenSSH (by Checkpoint implementation) bug or Checkpoint component working WITH ssh bug ?&lt;/P&gt;&lt;P&gt;When you talk about "trusted hosts" - what do you mean? Where did you try to limit access to SSH ?&lt;/P&gt;&lt;P&gt;Their suggestion of setting authentication type per IP is quite exotic - haven't seen such one in production Linux system.&amp;nbsp; I do sometimes limit SSH access in sshd_config as a foolproof against someone misconfiguring security rules allowing ANY to ssh, but usually something like that is enough:&lt;/P&gt;&lt;LI-CODE lang="c"&gt;AllowUsers  admin@123.123.123.10 admin@10.88.88.*  yurisk&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Taken from my post of 2011 and still working great &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;A href="https://yurisk.info/2011/04/05/two-tips-to-secure-ssh-access-from-specific-ips-to-specific-users-in-checkpoint-or-any-linux/" target="_blank" rel="noopener"&gt;Two tips to secure SSH access from specific IPs to specific users in Checkpoint or any Linux&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 30 Aug 2020 10:05:31 GMT</pubDate>
    <dc:creator>Yuri_Slobodyany</dc:creator>
    <dc:date>2020-08-30T10:05:31Z</dc:date>
    <item>
      <title>Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95201#M7385</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;There is a bug in R80.40 JHF GA take 67 which allows ssh connection access from any external IP to a management station, despite only specific IPs or networks being configured as trusted clients.&lt;/P&gt;&lt;P&gt;We have logged a TAC and R&amp;amp;D are investigating. In the interim, they have suggested the following to restrict access.&lt;/P&gt;&lt;P&gt;-------------------------&lt;/P&gt;&lt;P&gt;Configure ssh daemon in sshd_config (/etc/ssh/sshd.conf)&amp;nbsp;to use different authentication method depending on the client address/hostname.&lt;/P&gt;&lt;P&gt;First remove default authentication methods:&lt;/P&gt;&lt;P&gt;PasswordAuthentication no&lt;/P&gt;&lt;P&gt;PubkeyAuthentication no&lt;/P&gt;&lt;P&gt;Then add desired authentication methods after a&amp;nbsp;Match Address&amp;nbsp;in the end of the file. Placing&amp;nbsp;Match&amp;nbsp;in the end of the file is important, since all the configuration lines after it are placed inside the conditional block until the next&amp;nbsp;Match&amp;nbsp;line.&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;Match Addres&amp;nbsp;127.0.0.*&lt;/P&gt;&lt;P&gt;&amp;nbsp; PubkeyAuthentication yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other clients are still able to connect, but logins will fail because there is no available authentication methods.&lt;/P&gt;&lt;P&gt;-------------------------&lt;/P&gt;&lt;P&gt;Have anyone used this to restrict traffic?&lt;/P&gt;&lt;P&gt;We need to restrict access to 4 /24 networks and a /32 host.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More information about Match method in&amp;nbsp;sshd_config&lt;/P&gt;&lt;P&gt;&lt;A href="https://linux.die.net/man/5/sshd_config" target="_blank"&gt;https://linux.die.net/man/5/sshd_config&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Simon&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 02:01:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95201#M7385</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2020-08-26T02:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95204#M7388</link>
      <description>&lt;P&gt;It’s leveraging fairly standard OpenSSH functionality, I don’t see an issue with the suggestion.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 03:46:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95204#M7388</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-08-26T03:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95207#M7389</link>
      <description>&lt;P&gt;Could be wrong here, but I think why trusted hosts doesn't do anything to ssh is because tcp wrappers support isn't compiled into sshd.&lt;/P&gt;&lt;P&gt;&lt;A href="https://man7.org/linux/man-pages/man1/ldd.1.html" target="_blank"&gt;https://man7.org/linux/man-pages/man1/ldd.1.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@MDS1:0]# fw ver&lt;BR /&gt;This is Check Point's software version R80.40 - Build 101&lt;BR /&gt;[Expert@MDS1:0]# ldd `which sshd` | grep -i wrap&lt;BR /&gt;[Expert@MDS1:0]#&lt;/P&gt;&lt;P&gt;[Expert@MDS1:0]# ldd `which xinetd` | grep -i wrap&lt;BR /&gt;libwrap.so.0 =&amp;gt; /lib/libwrap.so.0 (0xf76a8000)&lt;BR /&gt;[Expert@MDS1:0]#&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.thegeekdiary.com/understanding-tcp-wrappers-in-linux/" target="_blank"&gt;https://www.thegeekdiary.com/understanding-tcp-wrappers-in-linux/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think if you wanted to use trusted hosts you would need to start sshd from xinetd instead of running sshd as its own daemon. Then you could prevent ssh hand shake of any kind of not passing tcp wrappers.&lt;/P&gt;&lt;P&gt;I will say your method is creative however.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 03:52:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95207#M7389</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-08-26T03:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95210#M7392</link>
      <description>&lt;DIV class="copy-paste-block"&gt;&lt;SPAN&gt;My main concern is whether or not the below syntax for multiple hosts and networks is valid i.e. if it does not match on the first, it will proceed to the second and so on&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&lt;SPAN&gt;e.g.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&lt;SPAN&gt;Match Address &amp;lt;ip address&amp;gt;/32&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp; PasswordAuthentication yes&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&lt;DIV class="copy-paste-block"&gt;&lt;SPAN&gt;Match Address &amp;lt;ip address&amp;gt;/24&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp; PasswordAuthentication yes&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&lt;DIV class="copy-paste-block"&gt;&lt;SPAN&gt;Match Address &amp;lt;ip address&amp;gt;/24&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp; PasswordAuthentication yes&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&lt;DIV class="copy-paste-block"&gt;&lt;SPAN&gt;Match Address &amp;lt;ip address&amp;gt;/24&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp; PasswordAuthentication yes&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&lt;DIV class="copy-paste-block"&gt;&lt;SPAN&gt;Match Address &amp;lt;ip address&amp;gt;/24&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp; PasswordAuthentication yes&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;I don't have out of band access to the management server and don't want to lock myself out.&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;Regards,&lt;/DIV&gt;&lt;DIV class="copy-paste-block"&gt;Simon&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 26 Aug 2020 06:59:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95210#M7392</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2020-08-26T06:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95587#M7422</link>
      <description>&lt;P&gt;I guess depends a lot on the issue/bug itself - is it an OpenSSH (by Checkpoint implementation) bug or Checkpoint component working WITH ssh bug ?&lt;/P&gt;&lt;P&gt;When you talk about "trusted hosts" - what do you mean? Where did you try to limit access to SSH ?&lt;/P&gt;&lt;P&gt;Their suggestion of setting authentication type per IP is quite exotic - haven't seen such one in production Linux system.&amp;nbsp; I do sometimes limit SSH access in sshd_config as a foolproof against someone misconfiguring security rules allowing ANY to ssh, but usually something like that is enough:&lt;/P&gt;&lt;LI-CODE lang="c"&gt;AllowUsers  admin@123.123.123.10 admin@10.88.88.*  yurisk&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Taken from my post of 2011 and still working great &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;A href="https://yurisk.info/2011/04/05/two-tips-to-secure-ssh-access-from-specific-ips-to-specific-users-in-checkpoint-or-any-linux/" target="_blank" rel="noopener"&gt;Two tips to secure SSH access from specific IPs to specific users in Checkpoint or any Linux&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2020 10:05:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95587#M7422</guid>
      <dc:creator>Yuri_Slobodyany</dc:creator>
      <dc:date>2020-08-30T10:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95623#M7427</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I dont think what I'm wanting to implement depends on the mentioned bug, which appears to be specific to R80.40.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I said trusted clients, not hosts, i.e. l&lt;SPAN&gt;imiting the access to the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Other_Varstp_sms"&gt;SMS&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;from a specified list of hosts.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Adding the entry mentioned in my 2nd post above to &lt;SPAN&gt;&amp;nbsp;sshd_config&amp;nbsp;&lt;/SPAN&gt;worked, after also changing or removing the default authentication methods.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Simon&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Aug 2020 00:32:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/95623#M7427</guid>
      <dc:creator>Simon_Macpherso</dc:creator>
      <dc:date>2020-08-31T00:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/98533#M7668</link>
      <description>&lt;P&gt;I'm curious, does this R80.40 build ignore "&lt;SPAN&gt;add allowed-client host|network" entries in clish? I found R77.10 does, the hard way. Bumped a cluster up to 77.30 today (yes today, please don't ask) and thought I'd lost a member after the first reboot, because my client wasn't in the list. I'd hate to see a repeat...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;No console either. Yay for field engineers and cprid_util &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 08:16:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/98533#M7668</guid>
      <dc:creator>cosmos</dc:creator>
      <dc:date>2020-10-08T08:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict SSH Access to Management Station - R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/120545#M17105</link>
      <description>&lt;P&gt;Just installed R80.40 + Take 118 in AWS and this issue is still present.&lt;/P&gt;&lt;P&gt;This issue was present with a open sever vmware install on take 76 but is fixed after installing Take 118, but not fixed in AWS with the same Take.&lt;/P&gt;&lt;P&gt;The specific line&amp;nbsp; in "/etc/ssh/sshd_config" which seems to be the root cause is: "PasswordAuthentication yes"&lt;/P&gt;&lt;P&gt;"yes" is BAD!&lt;/P&gt;&lt;P&gt;===============&lt;/P&gt;&lt;P&gt;# To disable tunneled clear text passwords, change to no here!&lt;BR /&gt;#PasswordAuthentication yes&lt;BR /&gt;#PermitEmptyPasswords no&lt;BR /&gt;PasswordAuthentication yes&lt;/P&gt;&lt;P&gt;===============&lt;/P&gt;&lt;P&gt;Change this to "no" and restart sshd "service sshd restart" and then the issue appears to go away.&amp;nbsp; Could be more to it, but this was the least single change that made a positive affect.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 09:51:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-SSH-Access-to-Management-Station-R80-40/m-p/120545#M17105</guid>
      <dc:creator>Douglas_Rich</dc:creator>
      <dc:date>2021-06-08T09:51:12Z</dc:date>
    </item>
  </channel>
</rss>

