|
![]() |
|
Thread Tools | Rate Thread | Display Modes |
#1
|
|||
|
|||
![]()
Hello folks at VanDyke,
In regard to the VShell SFTP server, we desire to implement one of these two things: 1) Log the external IP address behind the firewall/load balancer (via the X_FORWARDED_FOR headers inserted, like 207.82.250.251 instead of 10.11.12.13) and the credential name (like johndoeinc) when the server authenticates someone successfully. We can use this to build a threat model and map of individual credentials and their geo-location external IPs. OR 2) Build a PAM that will extract this value and write it to a log file with a successful login event, if this does not exist as yet in the product. What will be the process? This will help us mitigate a lot of threats as we are unsure of our partners managing their usernames/passwords and/or SSH keys securely and auditably. Thanks very much! We love you folks! |
#2
|
||||
|
||||
Hello sundarnut,
X-FORWARDED-FOR is an HTTP header. SFTP is a subsystem of the SSH2 protocol. SSH2 is built upon TCP (not HTTP).
You mentioned "PAM", as a possible solution. PAM can mean a lot of things in different contexts.
If the higher-priority goal is building a threat model based on the actual source IP of incoming TCP connections, it would seem more appropriate to configure the forwarding behavior of your firewall/load balancer to not perform any NAT in the case of TCP-level forwards directed to the VShell SFTP service. --Jake
__________________
Jake Devenport VanDyke Software Technical Support YouTube Channel: https://www.youtube.com/vandykesoftware Email: support@vandyke.com Web: https://www.vandyke.com/support |
![]() |
Tags |
authn authz ipaddress |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
Display Modes | Rate This Thread |
|
|