Ssh keys, yum, ntp, rsync 1.  CST8177 Linux Operating Systems II  Saturday 13-Dec-14 10:30-13:30 T130 2.

Slides:



Advertisements
Similar presentations
Sonny J Zambrana University of Pennsylvania ISC-SEO November 2008.
Advertisements

SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Linux network troubleshooting If your network connection is not working..
Security Chapters 14,15. The Security Environment Threats Security goals and threats.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
Installing and running FreeS/WAN. What is FreeS/WAN An implementation of IpSec for Linux –Can be found at Helps setup encrypted and/or.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Linux Setting up your network. Basic Approaches Configure during installation –Disadvantage -> not able to redo easily –Advantage-> holds your hand Configure.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
APACHE SERVER By Innovationframes.com »
Installing Linux softwares Sirak Kaewjamnong. 2 Software packets  When Linux developers create their software they typically bundle all the executable.
UNIT - III. Installing Samba Windows uses Sever Message Block(SMB) to communicate with each other using sharing services like file and printer. Samba.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Chapter 11 Compression, System Backup, and Software Installation.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Help session: Unix basics Keith 9/9/2011. Login in Unix lab  User name: ug0xx Password: ece321 (initial)  The password will not be displayed on the.
Lesson 7-Creating and Changing Directories. Overview Using directories to create order. Managing files in directories. Using pathnames to manage files.
SSH. Review 1-minute exercise: Find the open ports on you own VM [Good] nmap [Better] netstat -lpunt.
Unix Basics Chapter 4.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Linux Operations and Administration
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
Find Find basics. find ~ -name myfile –print find directory criteria This will search the home directory (~) looking for files.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Workbook 10 Chapter 8. Remote Shell Commands Pace Center for Business and Technology 1.
System Troubleshooting TCS Network, System, and Load Monitoring TCS for Developers.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
The Secure Shell Copyright © Software Carpentry 2011 This work is licensed under the Creative Commons Attribution License See
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
UNIT - III. Time Server It is a daemon that runs on one machine and to which other systems synchronize their system clocks. It is a service that provides.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
What is a port The Ports Collection is essentially a set of Makefiles, patches, and description files placed in /usr/ports. The port includes instructions.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1 CSE306 Operating Systems Projects CVS/SSH tutorial.
Sniffer, tcpdump, Ethereal, ntop
Linux Services Configuration
BNL PDN Enhancements. Perimeter Load Balancers Scaleable Performance Fault Tolerance Server Maintainability User Convenience Perimeter Security.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Linux Operations and Administration
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
1 Running MPI on “Gridfarm” Bryan Carpenter February, 2005.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
Tivoli Provisioning Manager V5.1 FP1 © 2006 IBM Corporation L2 GO Training Local TCA Install Przemyslaw Maciolek
CS 120 Extra: The CS1 Server Tarik Booker CS 120.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
1 Example security systems n Kerberos n Secure shell.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
UDP. User Datagram Protocol (UDP)  Unreliable and unordered datagram service  Adds multiplexing  No flow control  Endpoints identified by ports 
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Ifconfig Kevin O'Brien Washtenaw Linux Users Group
Secure services Unit-IV CHAP-1
Linux network troubleshooting
VMware ESX and ESXi Module 3.
Overview – SOE Rsync SEP 2014.
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
LINUX ADMINISTRATION 1
DHCP server & Client Objectives Contents
Getting SSH to Work Between Computers
Tutorial on Creating Certificates SSH Kerberos
File Transfer Olivia Irving and Cameron Foss
Presentation transcript:

ssh keys, yum, ntp, rsync 1

 CST8177 Linux Operating Systems II  Saturday 13-Dec-14 10:30-13:30 T130 2

 ifconfig to find your VM's ip address so you can ssh to it  ssh key login  yum  ntp  tar  scp  rsync 3

 run the /sbin/ifconfig command  on your new install, you'll have only your root account at first: # ifconfig eth0 Link encap:Ethernet HWaddr 00:0C:29:14:F8:93 inet addr: Bcast: Mask: inet6 addr: fe80::20c:29ff:fe14:f893/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:1112 errors:1099 dropped:0 overruns:0 frame:0 TX packets:4178 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes: (205.4 KiB) TX bytes: (609.4 KiB) Interrupt:19 Base address:0x2024 4

 key-based logins are more secure than password logins  you run ssh to log in from a client to a server  on the client, you have a private and public key pair (with passphrase)  on the server, you put your public key into ~/.ssh/authorized_keys  IMPORTANT: permissions 700 on.ssh/, 600 on authorized_keys  when you log in from the client to the server, you're prompted for your key's passphrase 5

 Anybody can generate a matching private/public key pair  You let anybody and everybody have a copy of the public key – it's public!  You keep your private key secret and hidden, only you have it – it's private!  Anyone who has your public key can use your public key to create a challenge that only someone with the matching private key can meet (in other words, only you can meet). 6

 Key pairs are designed mathematically so that something encrypted with one key of the private/public pair can be decrypted by only the matching key of the pair.  Something encrypted with the public key CANNOT be retrieved with the public key – the private key is required!  So the "challenge" is to encrypt a message (maybe random) with the public key.  Only someone with the private key can decrypt the message and retrieve the original message 7

 A copy of your public key is stored in authorized_keys in your account  You have the private key and you tell the ssh server that you want to log in  The ssh server says "OK", I have your public key here, and I'll use it to encrypt this random message, and give the result to you. If you can tell me the original message, you must have the private key (and you must be you).  You use your private key to retrieve the original message, and send it back to the server.  The server lets you in, because it assumes only you have the private key necessary to retrieve the original (random) message. 8

 Cinderella's slipper? ◦ the assumption is that only Cinderella's foot (which only Cinderella has) will fit into the slipper ◦ The foot and the slipper match like a private and public key match ◦ One difference is that in public key cryptography, everybody has a copy of the slipper (only the real Cinderella has the foot that will fit the slipper) ◦ If I want you to prove to me that you are Cinderella, I get you to prove to me that your foot fits in the Cinderella slipper – if it fits, you must be Cinderella ◦ The mathematics ensures that nobody else's foot will fit somebody's slipper, and given a slipper, you cannot create the matching foot. 9

 Generating a keypair on Linux client: $ ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/home/wen99999/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/wen99999/.ssh/id_rsa. Your public key has been saved in /home/wen99999/.ssh/id_rsa.pub. The key fingerprint is: 81:27:65:81:26:fb:1b:6c:71:ae:a0:9c:58:5b:64:3b The key's randomart image is: +--[ RSA 2048]----+ |.+. | |. o+ | | +o o | | +.o.. | | o + +S | |. E =. | | + = + + | |. = o | | ~]$ 10

 install your (client) public key to the server ◦ put the contents of id_rsa.pub (we generated this file on the client) into ~/.ssh/authorized_keys on the server ◦ can do this with vi, copy-paste ◦ alternatively, can do this with ssh-copy-id command ◦ you're running this command on the client client$ ssh-copy-id ◦ now you should be able to log in with the key, and you'll need to give your passphrase for your key 11

 12

 tes/520_package_management.html tes/520_package_management.html  yum can install software packages for you, retrieving them from a repository over the network  performs dependency analysis: if the package you want to install depends on another package, it will install that too  can also query installed packages, remove packages, update packages, etc  run with root privileges 13

 Examples: (see "man yum" for details) ◦ yum install ntp  install the package "ntp" and its dependencies ◦ yum update  update all currently installed packages ◦ yum update "nt*" # quote the glob from the shell  update all packages that match the glob ◦ yum –v repolist # print info about repositories ◦ yum list installed # list the installed packages ◦ yum list available # list the available packages ◦ yum list # combination of two above ◦ yum search fortune # search package names for fortune 14

 we shouldn't need to change these, but if you're curious...  repository files are in /etc/yum.repos.d ◦ CentOS-Base.repo  main CentOS repository mirrors ◦ CentOS-Media.repo  uses the DVD in your drive as a repository  To configure your machine to use the EPEL repository (for cowsay, fortune-mod, etc): ◦ rpm –Uvh el-release-6-8.noarch.rpm 15

 we'll be using the ntp package to keep our CentOS clocks synchronized with a time server, such as 1.centos.pool.ntp.org  ntpd, the ntp daemon, will look after keeping our clocks accurate  /etc/ntp.conf configures the daemon, and all we need to do is arrange for the daemon to start: bash$ chkconfig ntpd on bash$ chkconfig --list ntpd 16

 now that the ntpd daemon is configured to start upon entering runlevels 2,3,4,and 5, let's check whether it's running: bash$ service ntpd status ntpd is stopped  we are in runlevel 3 but we haven't actually entered that runlevel since we ran chkconfig  we'll start it manually this one time: bash$ service ntpd start 17

 create an archive of a directory ◦ tar cvzf mydirectory.tgz mydirectory  c: create an archive  v: verbose, print the filenames as their added  z: compress the archive  f: use the following as the filename for the archive  extract an archive ◦ tar xvzf mydirectory.tgz  x: extract an archive  z: uncompress the archive 18

 print listing of an archive without extracting ◦ tar tvzf mydirectory.tgz mydirectory  t: print a listing  v: verbose, like a long listing  z: the archive is compressed  f: use the following as the filename for the archive  In each of the above examples ◦ exactly one of t, c, or x is mandatory ◦ f with an archive name is mandatory ◦ z: is mandatory if archive is, or is to be, compressed ◦ v: is optional for verbosity 19

 scp behaves much like the familiar cp command, but with remote capabilities  The arguments (source or destination) can optionally be for a remote file/directory   A remote argument has a colon in it  To copy local passwd file to wen99999's home directory on a remote computer ◦ scp /etc/passwd ◦ Notice the colon in the remote dest argument ◦ file ~wen99999/passwd on cst8177.idallen.ca is created or if it already existed, it's overwritten 20

 Whatever name follows the colon is relative to the home directory on the remote side (unless it's an absolute path and therefore not relative)  use -p option to preserve timestamps, modes (analogous to -p with cp command)  Use CAPITAL P option to specify a port ◦ if you're at a McDonalds and you want to copy to myuser's home directory on the CLS: ◦ scp -P 443 localfile.txt ◦ again, notice the colon in the remote argument ◦ notice that port option is -p for ssh, -P for scp 21

 absolute local to absolute remote file foo ◦ scp -p /etc/passwd  relative local file to absolute remote directory ◦ scp -p myfile  directory and its contents to remote directory ◦ scp -rp mydir  absolute remote file to local home dir ◦ scp  relative remote file to current local dir ◦ scp 22

 rsync behaves similarly to scp  only one rsync argument can be remote  Example copy local (relative) to local (absolute):  rsync –aHv adir /some/dir ◦ a: archive mode, preserve permissions, timestamps, etc ◦ H: preserve hard links ◦ v: verbose ◦ if "dir" exists, "/some/dir/adir" will result ◦ if "dir" does not exist, "/some/dir" will be created and contain "adir", "/some/dir/adir" will result 23

 be careful with a trailing slash on the source  a trailing slash on source has special meaning: copy the contents of the directory  these are the same ◦ rsync –avH /src/foo /dst/ ◦ rsync –avH /src/foo/ /dst/foo  copy contents of src directory to dst directory ◦ rsync -avH /src/ /dst # /src/* in /dst/  copy src directory to dst directory ◦ rsync -avH /src /dst #end up with /dst/src 24

 If you can't remember directory creation, and directory contents (trailing slash) versus directory itself, then use dot as the source directory for unambiguous usage  All of the following will sync the local dir directory to make the remote rdir directory the same as dir, whether rdir already exists or not  Use the same name ( dir) on both sides if desired rysnc –avH path/to/dir/. rysnc –avH path/to/dir/. rysnc –avH path/to/dir/./ rysnc –avH path/to/dir/./ 25

 rsync can copy across the network rsync –avH dir/.  that will copy/synchronize the local "dir" with the remote "dir" in wen99999's home directory on the remote machine named “remote.example.com”  notice the colon in the remote argument  if you forget the colon, you do a local copy to a file with in its name 26

 after the colon, you can specify a relative path (relative to the home directory) or an absolute path rsync –av adir/.  that example uses an absolute path at the destination end, and an IP address instead of a hostname 27

 the other direction works too rsync  that copies the remote file /etc/passwd to the current directory (.), resulting in./passwd  this time, we are not using archive mode  this time, we are using an IP address instead of a fully qualified domain name 28

 rsync compares source and destination and minimizes the number of bytes that need to be copied to update the destination  rsync algorithm is designed to transfer only the parts of a file that have changed  notice the "speedup" in the summary when you use the "-v" option 29