for delivery. Similarly, all POP3 requests (port 110) on jupiter can be forwarded to the
POP3 port of sun with this command:
ssh -L 110:sun:110 jupiter
Both commands must be executed as
root
, because the connection is made to privileged
local ports. E-mail is sent and retrieved by normal users in an existing SSH connection.
The SMTP and POP3 host must be set to
localhost
for this to work. Additional in-
formation can be found in the manual pages for each of the programs described above
and also in the files under
/usr/share/doc/packages/openssh
.
14.8 Configuring An SSH Daemon with
YaST
To configure an sshd server with YaST run YaST and choose Network Services > SSHD
Configuration. Then proceed as follows:
1
On the General tab, select the ports sshd should listen on in the SSHD TCP Ports
table. The default port number is 22. Multiple ports are allowed. To add a new
port, click Add, enter the port number and click OK. To delete port, select it in
the table, click Delete and confirm.
2
On the General tab, select the features the sshd daemon should support. To disable
TCP forwarding, uncheck Allow TCP Forwarding. Disabling TCP forwarding
does not improve security unless users are also denied shell access, as they can
always install their own forwarders. See
Section 14.7, “X, Authentication, and
Forwarding Mechanisms”
(page 166) for more information about TCP forwarding.
To disable X forwarding, uncheck Allow X11 Forwarding. If this option is dis-
abled, any X11 forward requests by the client will return an error. However users
can always install their own forwarders. See
Section 14.7, “X, Authentication,
and Forwarding Mechanisms”
(page 166) for more information about X forward-
ing.
In Allow Compression determine, whether the connection between the server and
clients should be compressed. After setting these options, click Next.
SSH: Secure Network Operations
167
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......