SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast

Slides:



Advertisements
Similar presentations
VPN using SSH Implementing a secure Unix to Unix Virtual Private Network Gary Stainburn Ringways Garages Ltd.
Advertisements

SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast Allows both users to get jobs done, and also allows system administrators to sleep.
1 Automated SFTP Windows and SUN Linux and SUN. 2 Vocabulary  Client = local=the machine generating the SFTP request  Server = remote = the machine.
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Packet train experiments in DIMES and ETOMIC Ohad Serfaty Joszef Steger May 2006.
Free Powerpoint Templates Working on remote computers by Pedro Henriques June 1, 2012.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Remote access and file transfer Getting files on and off Bio-Linux.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
A crash course in njit’s Afs
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
Network Operating Systems versus Operating Systems Computer Networks.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Using VCL for Distributed Pair Programming CSC/ECE 517, Spring 2013.
Wireless Networks and the NetSentron By: Darren Critchley.
Remote Operation of Light Source Beamlines with (Free)NX Zhijian Yin, Peter Siddons, NSLS, BNL Controls at NSLS Facility Beamlines What Is NX, FreeNX Cybersecurity.
SSH Operation The Swiss Army Knife of encryption tools…
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Module 10: Windows Firewall and Caching Fundamentals.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
FileZilla An open-source success story. Mark Swelstad – Itec400, Winter 2007.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
PRESENTED BY ALI NASIR BITF13M040 AMMAR HAIDER BITF13M016 SHOIAB BAJWA BITF13M040 AKHTAR YOUNAS BITF13M019.
Basic Web Design UVICELL Week 4 Templates and site management Week 4 Templates and site management.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Remote access methods ● SSH ● VPNs ● VNC ● Screen - by Alex Harris.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Windows 10 Common VPN Error Tech Support Number
Norwalk LUG May Meeting
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Virtual Private Network Access for Remote Networks
Holland Computing Center STAT802 Create and access Anvil Windows 10 SAS instance 01/23/2017.
Ssh: secure shell.
WEB APPLICATION TESTING
CReSIS Git Tutorial.
NTP, Syslog & Secure Shell
Project 1 Simple Socket Client.
Hillsborough Community College
Port Forwarding and Shell Login Essentials
Virtual Network Computing
SECURE SHELL MONIKA GUPTA COT 4810.
Part 3 – Remote Connection, File Transfer, Remote Environments
INTEGRATING LINUX WITHIN A CORPORATE ENVIRONMENT Kai Ponte
Simple Socket Client Project 1.
XWN740 X-Windows Configuring and Using Remote Access
Vagrant Managing Virtual Machines
FTP - File Transfer Protocol
Lab 1 introduction, debrief
File Transfer Olivia Irving and Cameron Foss
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
VPN-Implementation Using UBUNTU OS and OpenVPN and Hamachi in client-server environment. By Ruphin Byamungu, Kusinza United States International University-Nairobi.
Telnet/SSH Connecting to Hosts Internet Technology.
Application layer Lecture 7.
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Simple Socket Client Project 1.
OPS235: Configuring a Network Using Virtual Machines – Part 2
NETWORK SECURITY LAB Lab 8. Firewall and VPN.
SSH Foo KW-LUG Presentation Epoch jasoneckert.net.
Windows Server Administration Fundamentals
Presentation transcript:

SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast Allows both users to get jobs done, and also allows system administrators to sleep at night Clients for every platform

What SSH can do Allows you to remotely log into systems and run commands Forward traffic over the SSH link (tunnel) Copy files Run commands without logging in

SSH basics

SSH basics

SSH basics

Problems already Always have to type my username in Always have to type in full hostname Always have to type in my password

Problems already Default behaviour Tries to connect to remote server using the username of your current logged in user This can be problematic, especially for Macs Uses the domain name of your local machine (so can’t ssh ui from everywhere in world)

Problem solved You can override default behaviour by using a config file in your home directory location is ~/.ssh/config

Problem solved Username

Problem solved Username Helps because Physics blocks/bans your IP address if you try connecting incorrectly more than 5 times common cause of this is wrong username

Problem solved 2. Full hostname

Problem solved 3. Password

Problem solved 5. Create private/public key pair (ssh-keygen) Upload public key to remote server (ssh-copy-id) Unlock private key (ssh-add) SSH using keypair Perfect for automated jobs and scripts! Won’t work with lxplus Make sure you password protect your SSH private key Keep private key secure!

Other config options Wildcards and regex is allowed e.g. Host * and Host *.ph.unimelb.edu.au will both work Note that it reads the file from top down, and stops at the first entry that matches

Background of network in Physics ui.atlas.unimelb.edu.au -> Tier 3 log in node restricted to hosts on AARNet network (uni’s) baker.ph.unimelb.edu.au -> School of Physics SSH gateway accessible anywhere All other hosts firewalled (inaccessible) May think that this restricts you....

SSH forwarding When you ssh, it opens a persistent connection with SSH server We can use this connection to make other traffic travel “through” it e.g. VNC, NX, SSH, web, files SSH will secure this traffic too! (basis for things like TOR and VPN)

SSH forwarding ssh –L localport:otherhost:otherhostport username@server

SSH forwarding

SSH forwarding Connections to local port 2222 get redirected over SSH to remote ssh server, which then redirects to port 22 on ui.atlas.unimelb.edu.au perfect for SSH’ing “directly” to UI, or for copying files from “non-Uni” places

SSH forwarding

SSH forwarding Original connection must be still open! (i.e. can’t close window or disconnect) Can do funky stuff, like be a “catch all” forwarder, for things like web (investigate the –D option in ssh and SOCKS proxy)

NX X is the graphical display manager in Linux It is bulky, and insecure over network Can forward this display using NX (NoMachine) Heavily compresses data, making it easier to display overseas/at home

NX For Melbourne, baker[1-6] have NX servers From home, port forward to port 22 on baker[1-6] through baker.ph.unimelb.edu.au Use NX client (http://www.nomachine.com/) to connect to forwarded port