Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 16
Advertisements

SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
NSRC Workshop Some fundamental security concerns... Confidentiality - could someone else read my data? Integrity - has my data been changed? Authentication.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
OpenSSH (SSH - Secure SHell) Silvio C. Sampaio Doctoral Programme in Informatics Engineering PRODEI011 - Computer Systems Security –
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Cunsheng Ding HKUST, Hong Kong, CHINA
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Secure Remote Access: SSH. K. Salah 2 What is SSH?  SSH – Secure Shell  SSH is a protocol for secure remote login and other secure network services.
EEC 688/788 Secure and Dependable Computing Lecture 8 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
The Secure Shell Protocol Jia Zhu Seminar WS 06/07 Computer Security Chair holder : Prof. Dr. Joachim von zur Gathen Tutor: Michael Nüsken, Daniel.
COS 420 DAY 24. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 8 Wenbing Zhao Department of Electrical and Computer Engineering.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Secure Shell (SSH) 4/19/06 Diane Conner Zoltan Csizmadia Doug Le.
Cs490ns-cotter1 SSH / SSL Supplementary material.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Secure Shell (and friends) From:
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
SSH Secure Login Connections over the Internet
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Telnet/SSH: Connecting to Hosts Internet Technology1.
OpenSSH: A Telnet Replacement Presented by Aaron Grothe Heimdall Linux, Inc.
SSH. Review 1-minute exercise: Find the open ports on you own VM [Good] nmap [Better] netstat -lpunt.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 10 Manage Remote Access.
Secure Socket Layer (SSL)
The Saigon CTT Chapter 16 Remote Connectivity. The Saigon CTT  Objectives  Explain : telnet rsh ssh  Configure FTP.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
Secure Remote Access: SSH. 2 What is SSH?  SSH – Secure Shell  SSH is a protocol for secure remote login and other secure network services over an insecure.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.
User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
Network Security Essentials Chapter 5
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
Tunneling and Securing TCP Services Nathan Green.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
SSH Operation The Swiss Army Knife of encryption tools…
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
Phil Hurvitz Securing UNIX Servers with the Secure.
SSH Tricks for CSF Slide 1 NEbraskaCERT SSH Tricks Matthew G. Marsh 05/21/03.
1 SSH / SSL Supplementary material. 2 Secure Shell (SSH) One of the primary goals of the ARPANET was remote access Several different connections allowed.
Potential vulnerabilities of IPsec-based VPN
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Cryptography CSS 329 Lecture 13:SSL.
1 Example security systems n Kerberos n Secure shell.
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Security with SSH Unix System Administration Workshop AfNOG 2007 Hervey Allen.
SSH – The ‘Secure’ Shell
Telnet/SSH Connecting to Hosts Internet Technology.
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
SECURITY IN THE LINUX OPERATING SYSTEM
SSH – the practical solution
Presentation transcript:

Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007

Scott Duckworth 2 What is SSH? “SSH is a protocol for secure remote login and other secure network services over an insecure network.” – RFC 4251 Secure channel between two computers Provides data confidentiality and integrity Many uses other than remote shell

April 19, 2007 Scott Duckworth 3 History SSH-1 designed in 1995 by Tatu Ylönen In response to a password-sniffing attack Replacement for rlogin, telnet, and rsh Released as freeware in July 1995 ~20,000 users in 50 countries by the end of the year Ylönen founded SSH Communications Security in December 1995 Code became increasingly more proprietary

April 19, 2007 Scott Duckworth 4 History (continued) SSH-2 designed in 1996 Incompatible with SSH-1 Security and feature improvements Open source implementations (OSSH and OpenSSH) created in 1999 OSSH is now obsolete OpenSSH is the most popular SSH implementation as of 2005

April 19, 2007 Scott Duckworth 5 Current Implementations (2007) OpenSSH – common on UNIX systems SSH Tectia – commercial implementation PuTTY – client only, Windows MindTerm – client only, Java applet

April 19, 2007 Scott Duckworth 6 Layering of SSH Protocols Transport Layer Protocol Provides server authentication, confidentiality, and integrity User Authentication Protocol Authenticates the client-side user to the server Connection Protocol Multiplexes the tunnel into logical channels New protocols can coexist with the existing ones

April 19, 2007 Scott Duckworth 7 Transport Layer Protocol Public-key host authentication Lets the client know the correct server is on the other end DSS or RSA, raw or through OpenPGP Strong symmetric encryption Uses Diffie-Hellman algorithm for secure key exchange Many ciphers are supported: 3des, blowfish, twofish, aes, etc., most with multiple key sizes New keys generated every 1 GB or 1 hour Data integrity via MACs (message authentication codes) SHA-1 and MD5 are supported

April 19, 2007 Scott Duckworth 8 User Authentication Protocol Multiple authentication methods public-key, password, host-based Extensible Server tells client which methods can be used, client picks the most convenient Provides a single authenticated channel to the connection protocol

April 19, 2007 Scott Duckworth 9 Connection Protocol Provides multiple channels: interactive login sessions remote execution of commands forwarded X11 connections forwarded TCP/IP connections All channels are multiplexed into a single encryption tunnel

April 19, 2007 Scott Duckworth 10 Attacks on SSH Man-in-the-middle Very easy if the client does not have the server’s public key prior to connecting Attacker masquerades between the client and server Denial of service Covert channels Server Attacker Client

April 19, 2007 Scott Duckworth 11 System Configuration Files (OpenSSH) /etc/ssh/ sshd_config – SSH server configuration ssh_config – SSH client configuration ssh_host_*_key – private host keys ssh_host_*_key.pub – public host keys ssh_known_hosts – list of known public host keys

April 19, 2007 Scott Duckworth 12 User Configuration Files (OpenSSH) ~/.ssh/ id_* - private authentication keys id_*.pub – public authentication keys known_hosts – list of known public host keys authorized_keys – list of allowed public authentication keys

April 19, 2007 Scott Duckworth 13 Public-Key Authentication Howto $ ssh-keygen -t rsa... $ cat ~/.ssh/id_rsa.pub | ssh 'cat - >> ~/.ssh/authorized_keys‘... $ ssh... Accept the defaults and leave the passphrase blank Enter your password one last time Enjoy not having to enter a password

April 19, 2007 Scott Duckworth 14 References and Resources RFC SSH: The Secure Shell – The Definitive Guide