Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Ferry Astika Saputra Workshop Administrasi Jaringan TELNET & SSH.
Advertisements

Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Chapter 21 Security. Computer Center, CS, NCTU 2 Firewall (1)  Using ipfw 1.Add these options in kernel configuration file and recompile the kernel 2.Edit.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Remote access and file transfer Getting files on and off Bio-Linux.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Course 201 – Administration, Content Inspection and SSL VPN
Computation for Physics 計算物理概論 Introduction to Linux.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
Web Server Administration Chapter 10 Securing the Web Environment.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
SCSC 455 Computer Security Network Security. Control access to system Access control mechanisms in specific network programs  e.g. 1, wu-FTP server support.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Phil Hurvitz Securing UNIX Servers with the Secure.
Linux services troubleshooting. If you cannot connect to your service.. When you start service, check that it says ok (most services say that when starting.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Server Hardening Moses Ike and Paul Murley TexSAW 2015 Credit to Daniel Waymel and Corrin Thompson.
Linux Services Configuration
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
CITA 310 Section 9 Securing the Web Environment (Textbook Chapter 10)
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Module 10: Windows Firewall and Caching Fundamentals.
Web Server Administration Chapter 10 Securing the Web Environment.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Securing your network But still be able to access it Hugh Mahon.
Getting Connected to NGS while on the Road…
Secure services Unit-IV CHAP-1
Ssh: secure shell.
Enumeration.
Virtual Private Networks
Instructor Materials Chapter 5 Providing Network Services
FIREWALL configuration in linux
The Linux Operating System
NTP, Syslog & Secure Shell
Port Forwarding and Shell Login Essentials
SECURE SHELL MONIKA GUPTA COT 4810.
XWN740 X-Windows Configuring and Using Remote Access
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Telnet/SSH Connecting to Hosts Internet Technology.
Chapter 27: System Security
Getting Connected to NGS while on the Road…
OPS235: Configuring a Network Using Virtual Machines – Part 2
TELNET BY , S.AISHWARYA III-IT.
Chapter 7 Network Applications
Computer Networks Protocols
Presentation transcript:

OPS235 Setup and Configure Secure Shell Services (ssh) Using Virtual Machines

Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH SSH Public Key Authentication scp, sftp SSH Tunnelling How to Make SSH More Secure

SSH The concept of connecting computers via wide area networks is not new. In the Fall 1969, the forerunner to the Internet was developed by connecting 4 computer systems via communication lines. This lead to the development of network-based applications: Telnet (1970) FTP (1972) Email Standard (using @ symbol - 1973)

SSH The problem with the Telnet and FTP applications is that they are not secure (at least the applications that were developed years ago). This means that Internet traffic is available for viewing and interpretations by other people (lurkers). This could pose a serious security risk – for example: account passwords. SSH (Secure Shell) is a method to allow secure transmission of data between two computer systems. This method uses public and private key cryptography initially theorized by Whitfield Diffy in the 70s.

SSH How to start ssh on all 3 Virtual Machines? How to establish ssh connection via Virtual Machines? How to establish ssh connection via Public Key Authentication What is the purpose of this above method? How to use scp and sftp?

SSH – Tunnelling SSH Tunnelling allows secure communications among computer system, not only for text-based transactions, but also remote graphical applications. SSH Tunnelling opens up an encrypted channel (tunnel) via a ssh connection. Assuming you are located in the centos1 virtual machine. What is the command using SSH tunnelling to run the gedit program on centos2, but display it in centos1?

SSH – Tunnelling SSH can be used to tunnel other types of traffic. For example, it can be used to bypass a firewall (iptables rule). How is this done? Establish an SSH Tunnel on a local port of the remote machine. For example, here is the command to create a tunnel for accessing the World Wide Web for a remote host called “hostname”: ssh -L 20808:hostname:80 user@hostname The above example assumes that incoming requests are blocked for port 80: iptables INPUT -p tcp s0/0 d0/0 –dport 80 DROP

Making SSHd More Secure Discuss the steps for making sshd more secure: More secure root passwords Edit /etc/ssh/sshd_config Deny root login Restrict user access Change default port number iptables rules to reject old ssh port and accept new ssh port Use ssh command with -p option Monitor system logs (eg. /var/log/secure) to check for authorized access attempts.