SSH Operation and Techniques - © 2001-2006 William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Sonny J Zambrana University of Pennsylvania ISC-SEO November 2008.
VPN using SSH Implementing a secure Unix to Unix Virtual Private Network Gary Stainburn Ringways Garages Ltd.
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast Allows both users to get jobs done, and also allows system administrators to sleep.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Remote Desktop Connection Techniques Wireless Communication Networks.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
EEC 688/788 Secure and Dependable Computing Lecture 8 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Guide To UNIX Using Linux Third Edition
COS 420 DAY 24. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
File sharing. Connect the two win 7 systems with LAN card Open the network.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Remote access and file transfer Getting files on and off Bio-Linux.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Telnet/SSH: Connecting to Hosts Internet Technology1.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
OpenSSH: A Telnet Replacement Presented by Aaron Grothe Heimdall Linux, Inc.
SSH Keys William Stearns
Computation for Physics 計算物理概論 Introduction to Linux.
1 Web Server Administration Chapter 9 Extending the Web Environment.
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
Chapter 10 Networking and the Internet ITSC 1458.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007.
SSH Operation The Swiss Army Knife of encryption tools…
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Phil Hurvitz Securing UNIX Servers with the Secure.
Chapter 28 - Remote Login and Remote Desktops(TELNET) Introduction Early Computers Used Textual Interfaces A Timesharing System Requires User Identification.
Linux Services Configuration
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Agenda Networking with Linux & UNIX OS –Overview –Setup –Common Utilities.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
COMP1321 Digital Infrastructure Richard Henson March 2016.
1 Example security systems n Kerberos n Secure shell.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
OpenSSH – Public Key Authentication ● Jonathan Schipp ● Dubois County Linux User Group ● Nov 7 th 2010 ● jonschipp (at) gmail.com.
Secure services Unit-IV CHAP-1
Ssh: secure shell.
SECURE SHELL MONIKA GUPTA COT 4810.
Module 4 Remote Login.
XWN740 X-Windows Configuring and Using Remote Access
FTP - File Transfer Protocol
File Transfer Olivia Irving and Cameron Foss
Telnet/SSH Connecting to Hosts Internet Technology.
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Windows Server Administration Fundamentals
Chapter 7 Network Applications
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…

SSH Operation and Techniques - © William Stearns 2 Overview SSH Introduction and Basic Use Copying files Port and X Windows forwarding SSH Keys and installation Ssh-agent Fanout and Fanterm

SSH Operation and Techniques - © William Stearns 3 SSH Features Command line terminal connection tool Replacement for rsh, rcp, telnet, and others All traffic encrypted Both ends authenticate themselves to the other end Ability to carry and encrypt non-terminal traffic

SSH Operation and Techniques - © William Stearns 4 Brief History SSH.com's SSH1, originally completely free with source code, then license changed with version SSH.com's SSH2, originally only commercial, but now free for some uses. OpenSSH team took the last free SSH1 release, refixed bugs, added features, and added support for the SSH2 protocol.

SSH Operation and Techniques - © William Stearns 5 Installation OpenSSH is included with a number of Linux distributions, and available for a large number of Unices On RPM-based Linuxes: rpm -Uvh openssh*.rpm

SSH Operation and Techniques - © William Stearns 6 Basic use ssh SshServerName ssh -l UserName SshServerName ssh SshServerName CommandToRun ssh -v SshServerName Server Host Key checks Uses same login password And if we need to encrypt other traffic?

SSH Operation and Techniques - © William Stearns 7 Securely copying files scp scp -p localfile remotemachine:/remotepath/file Prompts for authentication if needed All traffic encrypted Replaces ftp, rcp, file sharing

SSH Operation and Techniques - © William Stearns 8 File synchronization - Rsync Rsync copies a tree of files from a master out to a copy on another machine. Can use ssh as its transport. rsync -azv -e ssh /home/wstearns/webtree/ mirror.stearns.org/home/web/

SSH Operation and Techniques - © William Stearns 9 Port Forwarding - real server on remote machine I want to listen on port 5110 on this machine; all packets arriving here get sent to mailserver, port 110: ssh -L 5110:mailserver:110 mailserver

SSH Operation and Techniques - © William Stearns 10 Port Forwarding - real server on this machine All web traffic to my firewall should be redirected to the web server running on port 8000 on my machine instead: ssh -R 80:MyMachine:8000 firewall

SSH Operation and Techniques - © William Stearns 11 X Windows forwarding No setup - already done! Run the X Windows application in the terminal window: xclock & The screen display shows up on your computer, and any keystrokes and mouse movements are sent back, all encrypted.

SSH Operation and Techniques - © William Stearns 12 Packet forwarding – VPNs Tunnel packets over the SSH connection Connects to a virtual network device on both ends Openssh 4.3 and higher

SSH Operation and Techniques - © William Stearns 13 SSH key background Old way: password stored on server, user supplied password compared to stored version New way: private key kept on client, public key stored on server.

SSH Operation and Techniques - © William Stearns 14 SSH key creation General command: ssh-keygen -b c 'Comment' -f ~/.ssh/identity_file Different forms for each of the SSH flavors Assign a hard-to-guess passphrase to the private key during creation. Key can be used for multiple servers

SSH Operation and Techniques - © William Stearns 15 SSH key installation 3 versions of ssh: interoperability is good, but poorly documented ssh-keyinstall utility automates the creation and installation 'ssh-keyinstall -s SshServerName' creates keys, if needed, and installs them on the remote server Need password during key install only

SSH Operation and Techniques - © William Stearns 16 Using SSH keys ssh SshServerName Ssh -l UserName SshServerName ssh SshServerName CommandToRun Ssh -v SshServerName

SSH Operation and Techniques - © William Stearns 17 ssh-agent Remembers your private key(s) Other applications can ask ssh-agent to authenticate you automatically. Unattended remote sessions. Should already be running in the background ssh-add [KeyName]

SSH Operation and Techniques - © William Stearns 18 Fanout Runs command on multiple machines by opening separate ssh session to each fanout 'machine1 machine2 'command params' Gives organized output from each machine

SSH Operation and Techniques - © William Stearns 19 Fanterm – live control of multiple machines Fanterm provides interactive control of multiple remote systems. Initial window receives keystrokes. Keystrokes sent to each remote system. Output from each system shows up in a seperate terminal.

SSH Operation and Techniques - © William Stearns 20

SSH Operation and Techniques - © William Stearns 21 Fanqueue – the next generation Queue commands to be run on a group of machines Handles case where a machine is unavailable Allows new machines to be added later

SSH Operation and Techniques - © William Stearns 22 Rsync-backup Rsync-backup automates the process of backing up machines with rsync and ssh. Features: Only changed data shipped All permissions preserved All communication encrypted Unlimited snapshots Use <= 2X-4X combined client capacity

SSH Operation and Techniques - © William Stearns 23 Rsync-backup client install Install ssh, rsync, and rsync-backup-client rpms (see ) Install ssh-keyinstall on client to create a backup key with ssh-keyinstall -s backupserver -u root -c /usr/sbin/rsync-backup-server

SSH Operation and Techniques - © William Stearns 24 Rsync-backup server install Install ssh, freedups, rsync-static, and rsync- backup-server rpms Turn off password authentication in /etc/ssh/sshd_config

SSH Operation and Techniques - © William Stearns 25 Rsync-backup examples Examples of backup commands: rsync-backup-client / rsync-backup-client /usr /home/gbk

SSH Operation and Techniques - © William Stearns 26 Links and references SSH, The Secure Shell, The Definitive Guide ssh-keyinstall, fanout, rsync-backup, freedups and other apps at

SSH Operation and Techniques - © William Stearns 27 More links Docs at faq.html William Stearns