SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.

Slides:



Advertisements
Similar presentations
Module XXI Cryptography
Advertisements

Cryptography and Network Security Chapter 16
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Cryptography and Network Security
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Cryptography and Network Security Chapter 17
Cunsheng Ding HKUST, Hong Kong, CHINA
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Secure Remote Access: SSH. K. Salah 2 What is SSH?  SSH – Secure Shell  SSH is a protocol for secure remote login and other secure network services.
Chapter 8 Web Security.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Cs490ns-cotter1 SSH / SSL Supplementary material.
SSH Secure Login Connections over the Internet
Telnet/SSH: Connecting to Hosts Internet Technology1.
OpenSSH: A Telnet Replacement Presented by Aaron Grothe Heimdall Linux, Inc.
Computation for Physics 計算物理概論 Introduction to Linux.
Secure Socket Layer (SSL)
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Secure Remote Access: SSH. 2 What is SSH?  SSH – Secure Shell  SSH is a protocol for secure remote login and other secure network services over an insecure.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Network Security Essentials Chapter 5
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
WEP Protocol Weaknesses and Vulnerabilities
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Tunneling and Securing TCP Services Nathan Green.
BASIC INTERNET PROTOCOLS: http, ftp, telnet. Mirela Walczak.
Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
1 SSH / SSL Supplementary material. 2 Secure Shell (SSH) One of the primary goals of the ARPANET was remote access Several different connections allowed.
Understand Internet Security LESSON Security Fundamentals.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Cryptography CSS 329 Lecture 13:SSL.
1 Example security systems n Kerberos n Secure shell.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Secure Sockets Layer (SSL)
SECURE SHELL MONIKA GUPTA COT 4810.
Module 4 Remote Login.
SSH – The ‘Secure’ Shell
File Transfer Protocol
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Computer Security Distributed System Security
SSH – the practical solution
MESSAGE ACCESS AGENT: POP AND IMAP
Lecture 36.
Lecture 36.
Presentation transcript:

SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003

Outline  Introduction  Brief History  What is Secure Shell ?  Features of Secure Shell  Security Mechanism of Secure Shell  SSH1 vs. SSH2  Conclusion

Introduction  Widely used utilities to login through a network in Unix environment are telnet and rlogin  Problem - user's login name and password transmitted as clear text  Data transmission after login - also in clear text ! “SSH, the Secure Shell is a powerful, software-based approach to network security that provides a secure channel for data transmission through a network”

History  Developed by Tatu Ylonen, Helsinki University of Technology, Finland in 1995 to prevent network attack against University network  Published the protocol SSH-1 as an IETF (Internet Engineering Task Force) draft  Founded SSH communications security Ltd., in late 1995 (  Later released SSH-2

What is Secure Shell ?  Powerful, convenient approach to protecting communications on a computer network  Provides a secure channel for data transmission  Not a command interpreter  Provides a secure pipe to open up a command interpreter

What is Secure Shell ? (Contd..)  Supports secure remote logins, secure remote command execution, secure file transfers  Has a client server architecture – SSH server program and client program

Features  Privacy : via strong end-to-end encryption- DES, IDEA, Blowfish  Integrity : via 32 bit Cyclic Redundancy Check (CRC-32)  Authentication : server via server’s host key, client usually via password or public key  Authorization : controlled at a server wide level or per account basis  Forwarding : encapsulating another TCP based service such as Telnet within an SSH session

Security Mechanism Establishing the Secure Connection  The client initiates the connection by sending a request to the TCP port of the SSH server  Server reveals it's SSH protocol version to the client  If the client and server decide their versions are compatible, the connection proceeds

 SSH server sends the following to the client - host key, the server key, a list of supported encryption, compression and authentication methods, and a sequence of eight random bytes  Client checks identity of server by using the host key against known hosts database  Client generates a session key and double encrypts it using the host key & server key  Client sends encrypted session key along with check bytes and acceptable algorithm Establishing the Secure Connection (Contd..)

 Server then decrypts the encrypted session key it received  Server sends a confirmation encrypted with this session key  Client receives confirmation, confirms server authentication  Client Authentication usually either by Password Authentication or Public key Authentication Authentication

Authentication (Contd..)  Server confirms client authorization  Generates a 256 bit random challenge, encrypts it with clients public key, and sends to client  Client decrypts challenge, generates a hash value with a session identifier (commonly generated random string at beginning of session), and sends to server  Server generates hash, if both match, session is authenticated

SSH2 vs. SSH1  SSH2 has separate transport, authentication, and connection protocols.SSH1 has one monolithic protocol  SSH2 has strong cryptographic integrity check using MAC, SSH1 has weak checking using CRC-32  SSH2 supports any number of session channels per connection (including none),SSH1 exactly one  Servers running SSH-2 can also run SSH-1 to take care of clients running SSH-1  SSH2 allows more than one form of authentication per session, SSH1 allows only one.

Conclusion  SSH provides a secure channel for data transmission  Provides a secure pipe to open up a command interpreter  Latest version of SSH –SSH3

Thank You