I thought about running different sshd daemons but that doesn't really help in 
my situation.  User IP's can vary wildly but I can restrict access *to* the box 
using radius based on username.  Problem is once that user connects, I need to 
restrict his outbound access based on an IP policy, which is currently being 
filtered outside of the server on a Cisco ASA firewall (currently expecting to 
see the IP address of whichever server the user is connected to).


-----Original Message-----
From: owner-t...@openbsd.org [mailto:owner-t...@openbsd.org] On Behalf Of Chris 
Cappuccio
Sent: Tuesday, September 09, 2014 10:28 AM
To: Nagle, Edwin (James)
Cc: tech@openbsd.org
Subject: Re: SSH Sourcing

Nagle, Edwin (James) [edwin.na...@austinenergy.com] wrote:
> Good morning,
> 
> My problem is, I am separating users based on interface IP and radius, and 
> therefore need to force their outbound SSH sessions to bind to the IP address 
> of the interface they came in on (or at least a different IP) so I can create 
> firewall rules to restrict outbound access.  However, all outbound SSH 
> sessions are sourced through the default (bnx0) interface and therefore 
> hamper my ability to effectively firewall the outbound SSH requests since the 
> user could be in one of three firewall groups.  I may be just thinking too 
> hard about this but it seems to me there should be (and likely is) a simple 
> way to bind the outgoing connection from the source address.
> 
> Any ideas, or should I just create three virtual machines and be done with it?
> 
> Again, thanks in advance for any guidance!
> 

If each user ID is correlated with a separate IP, you could run different sshd 
each which only allows certain users to log in, and then use pf to restrict 
each user in certain ways. 


Reply via email to