SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.

Slides:



Advertisements
Similar presentations
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Advertisements

Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Henric Johnson1 Electronic mail security Henric Johnson Blekinge Institute of Technology, Sweden
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Remote Networking Architectures
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Remote access and file transfer Getting files on and off Bio-Linux.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
SSH Secure Login Connections over the Internet
Telnet/SSH: Connecting to Hosts Internet Technology1.
Course 201 – Administration, Content Inspection and SSL VPN
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Computation for Physics 計算物理概論 Introduction to Linux.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 10 Manage Remote Access.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
FTP (File Transfer Protocol) & Telnet
Prof. John A. Copeland fax Office: Klaus
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
1 Electronic Mail Security Outline Pretty good privacy S/MIME Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
1 Chapter 5 Electronic mail security. 2 Outline Pretty good privacy S/MIME Recommended web sites.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Tunneling and Securing TCP Services Nathan Green.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Phil Hurvitz Securing UNIX Servers with the Secure.
Linux Services Configuration
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
1 Example security systems n Kerberos n Secure shell.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Remote access methods ● SSH ● VPNs ● VNC ● Screen - by Alex Harris.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Getting Connected to NGS while on the Road…
Secure services Unit-IV CHAP-1
TOPIC: HTTPS (Security protocol)
Application Layer Functionality and Protocols
Ssh: secure shell.
Electronic mail security
Instructor Materials Chapter 5 Providing Network Services
SECURE SHELL MONIKA GUPTA COT 4810.
Telnet/SSH Connecting to Hosts Internet Technology.
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Getting Connected to NGS while on the Road…
Chapter 7 Network Applications
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

SSH

2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software implementing SSH is PuTTY – Download and test for free – ad.html ad.html – You need a login account on a server (usually Linux) supporting logins through SSH Servers usually operate SSH at TCP port 22 – What is a TCP port?

3 SSH Protocol Basics Host authentication (to the user) – Known hosts Server on the list of trusted hosts on client machine Danger of spoofing User authentication (to the server) – Password based User enters a username and password Sent encrypted with Server’s public key – RSA/DSA Server maintains copy of user’s public key Method 1: signed session id: The client signs a session id. The server verifies it with the corresponding public key Method 2: challenge-response: Server encrypts a random number with the user’s public key; Client proves identity by decrypting it.

4 Uses and Advantages of SSH SSH Overcomes limitation of Telnet – Of transmitting passwords in clear on networks on the way to the server Originally designed for remote login – But can also be used for encrypted file transfer Increasingly used to transport other applications – This is called SSH port forwarding or tunnelling

5 SSH-Architecture Client-Server architecture An SSH server program listens on a computer’s TCP port 22 An SSH Client program (e.g. PuTTY) requests connection to the server Disconnects when finished Or when server announces time out SSH Server SSH Client port 22 On Desktop e.g. on thoth.dsunix.net

6 SSH - Software Several implementations for both SSH Client and Servers exist – PuTTY is just one of them (and the most popular) Linux: – Client: OpenSSH Client (most popular) Run at the command line with the command “ssh” – Server: OpenSSH Server (most popular) Either starts automatically at startup or by typing command “sshd” (stands for ssh daemon) Windows: – Client: PuTTY (most popular)-Has a GUI – Server: SSH Server by OpenSSH Uncommon but not impossible to have SSH Server on Desktop machine

7 User Agent Role S/MIME uses Public-Key Certificates - X.509 version 3 signed by Certification Authority Functions: – Key Generation - Diffie-Hellman, DSS, and RSA key-pairs. – Registration - Public keys must be registered with X.509 CA. – Certificate Storage - Local (as in browser application) for different services. – Signed and Enveloped Data - Various orderings for encrypting and signing.

8 SSH Software usage SSH provides a virtual terminal – User almost feels as if she is using the remote system – In reality, she is only connected to the remote system Same in Telnet too but there transmitted data is unencrypted – In SSH, all data is encrypted SSH can also be used for remote command execution – Syntax: ssh –l username hostname command – E.g. ssh –l malladis thoth.dsunix.net ‘rm index.html’

9 User Agent Role Example: Verisign ( – Class-1: Buyer’s address confirmed by ing vital info. – Class-2: Postal address is confirmed as well, and data checked against directories. – Class-3: Buyer must appear in person, or send notarized documents.

10 File transfer with SSH FTP transfers files in the clear – SSH can be used to do encrypted file transfer – Also termed SCP (Secure Copy) WinSCP is a software that implements SCP – available for free download – Has a GUI Command line SCP tools require the command – pscp

11 Port Forwarding in SSH Use of SSH from a different port Enables the use of SSH for insecure TCP/IP applications (such as , web browsing etc.) Also to bypass firewalls – How? Port forwarding can solve problems – See next slide

12 SSH Port forwarding NOTE: Same host need not host SSH, Mail, Database and VNC (as in this picture).

13 A Problem Consider the situation – Say an employee at a company is away from office – Wants to access her IMAP by connecting to an internal host in the corporate network, remotely – But the IMAP port (143) is blocked by the corporate firewall Normally this would mean she cant read her

14 A Problem ( continued) But say the SSH port (22) is open on the firewall And she has an account on an internal machine that runs SSH server She can then set up a “SSH tunnel” from a local port on her client PC, through the SSH server and on to the desired application (in this case, the mail server on port 143). Next she can connect her mail client on the local port (from which she set up an SSH tunnel to port 22) – The connection is forwarded to the desired application (the mail server)

15 Secure Tunnel Set up command (also possible in PuTTY): ssh –l loginname –L 1143:mailserver:143 sshserver.company.com (user is prompted for password) Company Network Firewall Port 1143 Port 22 Port 143 Internet Secure SSH Tunnel

16 To use it: In the client settings, incoming mail server has to be set to and port number for IMAP to 1143: –Note that host name localhost or IP address refer to the local machine

17 Port forwarding – more examples Say your academic institution subscribed to journals and articles from various websites – Where authentication is based on the institution’s IP address range – Meaning that only people within the institution (physically) can get access But if you can forward a local port on the Web Proxy via a SSH server accessible from outside, you can appear to websites as though you are accessing from within your institution

18 Security of port forwarding Good aspects of port forwarding – Secure access to insecure services Can transport any kind of application – , web browsing, file transfer etc. – Bypassing firewalls Forces users to only access internal services securely Bad aspects – Gives users (consequently attackers) means to access arbitrary internal services – Since only password authentication is used, all an attacker is need is password of any one user on SSH And then for example, browse the company’s intranet