OpenSSH (SSH - Secure SHell) Silvio C. Sampaio Doctoral Programme in Informatics Engineering PRODEI011 - Computer Systems Security –

Slides:



Advertisements
Similar presentations
Sonny J Zambrana University of Pennsylvania ISC-SEO November 2008.
Advertisements

SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Remote access and file transfer Getting files on and off Bio-Linux.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Secure Shell (SSH) 4/19/06 Diane Conner Zoltan Csizmadia Doug Le.
Cs490ns-cotter1 SSH / SSL Supplementary material.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
SSH Secure Login Connections over the Internet
Telnet/SSH: Connecting to Hosts Internet Technology1.
OpenSSH: A Telnet Replacement Presented by Aaron Grothe Heimdall Linux, Inc.
Computation for Physics 計算物理概論 Introduction to Linux.
SSH. Review 1-minute exercise: Find the open ports on you own VM [Good] nmap [Better] netstat -lpunt.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 10 Manage Remote Access.
The Saigon CTT Chapter 16 Remote Connectivity. The Saigon CTT  Objectives  Explain : telnet rsh ssh  Configure FTP.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Network Security: Lab#3 Transport-Level Security Tools J. H. Wang May 12, 2011.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
Tunneling and Securing TCP Services Nathan Green.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007.
SSH Operation The Swiss Army Knife of encryption tools…
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
SSH Tricks Slide 1 SSH Tricks Matthew G. Marsh. SSH Tricks Slide 2 Overview  SSH –What is it –How does it work  Discussion of Network Topology –Tricks.
Phil Hurvitz Securing UNIX Servers with the Secure.
SSH Tricks for CSF Slide 1 NEbraskaCERT SSH Tricks Matthew G. Marsh 05/21/03.
1 SSH / SSL Supplementary material. 2 Secure Shell (SSH) One of the primary goals of the ARPANET was remote access Several different connections allowed.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Team 6 Decrypting Encryption Jeffrey Vordick, Charles Sheefel, and Shyam Rasaily.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
1 Example security systems n Kerberos n Secure shell.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Security with SSH Unix System Administration Workshop AfNOG 2007 Hervey Allen.
Secure services Unit-IV CHAP-1
Ssh: secure shell.
SECURE SHELL MONIKA GUPTA COT 4810.
XWN740 X-Windows Configuring and Using Remote Access
SSH – The ‘Secure’ Shell
Telnet/SSH Connecting to Hosts Internet Technology.
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
SSH – the practical solution
Chapter 7 Network Applications
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

OpenSSH (SSH - Secure SHell) Silvio C. Sampaio Doctoral Programme in Informatics Engineering PRODEI011 - Computer Systems Security – 2009/10

Silvio C. Sampaio 2 Outline Overview Protocol details Experiments References

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 3 Overview: What is OpenSSH? “OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on”. (SOURCE: SSH is a set of standards and associated protocols to establish a secure channel between two computers.  Covers authentication, encryption, and data integrity.  Originally, a replacement of insecure applications like telnet and some others “r-commands”

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 4 Overview: History and Development In 1995, Tatu Ylönen, a researcher at Helsinki University of Technology, Finland, designed the first version of the protocol (now called SSH-1) "Secsh" was the official Internet Engineering Task Force's (IETF) name for the IETF working group responsible for version 2 of the SSH protocol.  In 1996, a revised version of the protocol, SSH-2, was adopted as a standard.  This version is incompatible with SSH-1. A complete description about the history and development of the SSH can be found at [1].

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 5 Overview: SSH Features Secure Remote Logins Secure File Transfer and Backup Secure Remote Command Execution Keys and Agents Access Control Port Forwarding and Tunneling

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 6 Overview: Some SSH Implementations Source: Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes – SSH: The Secure Shell (The Definitive Guide), O'Reilly 2005 (2nd edition).

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 7 Protocol details: Introduction The SSH protocol ensures that all communication over the network is secure through the following safeguards:  Encryption of data during transmission to protect privacy  Prevention of data corruption, whether deliberate or otherwise, through integrity checking  Authentication of users and hosts to prevent unauthorized logins/connections  Authorization or controlling access and privileges  Protection of other TCP/IP sessions through tunneling or forwarding

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 8 Protocol details: Authentication Methods Different methods can be used to authenticate users and servers in SSH Secure Shell.  These authentication methods can be combined or used separately, depending on the level of functionality and security you want. Methods:  For Server authentication: Public-Key Authentication Certificate Authentication  For Users authentication: Password Authentication Public-Key Authentication Host-Based Authentication Certificate Authentication Kerberos Authentication Pluggable Authentication Module (PAM) SecurID

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 9 Protocol details: Architecture The Architecture of an general SSH System Source: Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes – SSH: The Secure Shell (The Definitive Guide), O'Reilly 2005 (2nd edition).

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 10 Protocol details: Architecture of SSH1 The Architecture of an SSH1 System Source: Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes – SSH: The Secure Shell (The Definitive Guide), O'Reilly 2005 (2nd edition).

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 11 Protocol details: Architecture of SSH2 The Architecture of an SSH2 System Source: Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes – SSH: The Secure Shell (The Definitive Guide), O'Reilly 2005 (2nd edition).

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 12 Protocol details: SSH1 x SSH2 SSH1 is older, slower protocol with significant security problems SSH2 is the newest, most efficient protocol  Resolves all known weaknesses in SSH1 security  IETF standard SSH1 “hardcodes” most of it’s cryptography SSH2 negotiates cryptographic algorithms at runtime  Makes it easier to use internationally A good summary of the difference between versions 1 and 2 of the SSH protocol can be found at:

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 13 Protocol details: SSH1 x SSH2 The major differences between SSH-1 and SSH-2 are, namely [1]:  Expanded algorithm negotiation between client and server  Multiple methods for key-exchange  Certificates for public keys  More flexibility with authentication, including partial authentication  Stronger integrity checking through cryptography  Periodic replacement of the session key (“rekeying”)

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 14 Protocol details: Algorithms Used SSH-1 Ciphers 3DESIDEARC4DES(Blowfish) SSH1xxoox OpenSSHx---x SSH-2 Ciphers 3DESBlowfishTwofishCAST-128IDEARC4 SSH2xxx--x F-Secure SSH2 xxxx-x OpenSSH xx-x-x x : The implementation supports the algorithm and is included in the default build. o : The implementation supports the algorithm, but it isn't included in the default build (it must be specifically enabled when compiling). - : The implementation doesn't support the algorithm.

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 15 Exp #1: Secure Remote Login (1) Remote Login  Command line ssh ssh –l user servidor  Using some ssh client  At the first connection Cliente(known_hosts) += Server(ssh_host_rsa_key.pub)

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 16 Exp #1: Secure Remote Login (2) X11 Forwarding  Automatic on Linux/Unix client ssh –X  Windows client: XServer is needed (e.g. Xming) Some applications (e.g. PuTTy) has especific configurations (but you can always use the comand export DISPLAY=Client_IP)

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 17 Exp #2: Secure File Copy Secure copy Copies files between host machines Authenticates user and host Encrypts copied data during transmission If keys are set up correctly for the user, no password entry will be required for access to remote machine. Ex: scp […]  scp  scp -r ~/simulations/*

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 18 Exp #3: Secure Remote Command Execution Executes command(s) on a remote machine from a local machine Authenticates user and host Encrypts transmitted data between machines If keys are set up correctly for the user, no password entry will be required for access to remote machine. Ex: ssh command  ssh ls -la

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 19 Exp #4: Port Forwarding and Tunneling Experiment assumptions: Servidor POP3: pop3.server.com, porta 110 Servidor SMTP: smtp.server.com, porta 25 Seu “username” em server.com: user ssh -L7110:pop3.servidor.com:110 - L7025:smtp.server.com:25  Sintaxe: -L localport:server:remoteport In the webmail client:  Replace the POP3 pop3.servidor.com by localhost and the port 110 by 7110  Replace the POP3 smtp.servidor.com by localhost and the port 25 by 7025

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 20 Exp #5: Automatic Authentication Key creation  ssh-keygen -t rsa  ssh-keygen -b t rsa Enter file in which to save the key (/home/ac/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Just to make sure!!!: chmod 0600 ~/.ssh/id_rsa Copying the key to remote servers  scp ~/.ssh/id_rsa.pub  ssh  cat rsa.pub_imported >>.ssh/authorized_keys Testing  ssh (and i hope it works!!!)

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 21 Exp #6: File Transfer SFTP  SFTP stands for ‘Secure File Transfer Protocol’. It provides secure file transfer functionality over any reliable data stream. It uses SSH.  SFTP protocol runs on secure channel.  Encrypts all traffic (including passwords) to effectively.  Provides variety of authentication methods.  It can be automated by public and private key authentication. sftp Once you are connected:  sftp> lcd /files [change local directory to /files]  sftp> cd /tmp [change remote directory to /etc]  sftp> get test.txt [download /tmp/test.txt to /files/test.txt]  sftp> ? [view summary help]  sftp> bye [terminate connection]

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 22 References 1.Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes – SSH: The Secure Shell (The Definitive Guide), O'Reilly 2005 (2nd edition)

PRODEI011 - Computer Systems Security – 2009/10 Silvio C. Sampaio 23 Thank you! Silvio C. Sampaio Any Questions?