By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.

Slides:



Advertisements
Similar presentations
Secure Mobile IP Communication
Advertisements

SCSC 455 Computer Security
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
Mobile IP Security Dominic Maguire Research Essay Presentation Communications Infrastructure Module MSc Communications Software, WIT
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
CMSC 414 Computer (and Network) Security Lecture 21 Jonathan Katz.
Vault: A Secure Binding Service Guor-Huar Lu, Changho Choi, Zhi-Li Zhang University of Minnesota.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
COS 420 DAY 24. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 2 File Systems & Unix Commands. File System Hierarchy.
MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents Presented By Mr. Muhammad Awais Shibli.
Linux Networking and Security Chapter 11 Network Security Fundamentals.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
Tunneling and Securing TCP Services Nathan Green.
Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007.
CHAPTER 9 Sniffing.
Reinventing Digital Identity Design Goals Product Overview Technology & Cryptography Overview Question & Answer.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
Phil Hurvitz Securing UNIX Servers with the Secure.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
CMSC Presentation An End-to-End Approach to Host Mobility An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan Alex C. Snoeren.
1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
Confidentiality using Conventional Encryption Chapter 5.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
1 Example security systems n Kerberos n Secure shell.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Virtual Private Networks
CMSC 414 Computer and Network Security Lecture 15
CIT 480: Securing Computer Systems
CS 142 Lecture Notes: Network Security
CS 142 Lecture Notes: Network Security
SECURITY IN THE LINUX OPERATING SYSTEM
CS 142 Lecture Notes: Network Security
Advanced Computer Networks
Presentation transcript:

By Chris Zachor CS 650

 Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion

 Problem: How do we communicate securely over an insecure network?  Solution: Use an SSH encrypted tunnel  We will focus on passive eavesdropping attacks which violate confidentiality

 A secure replacement for insecure applications such as telnet and rlogin  A symmetric key is negotiated using public and private keys  The client is then authenticated on the server and allowed to execute commands remotely  This includes allowing the server to forward data for the client

 SSH server (OpenSSH)  SSH client  Proxy Aware Application/Proxy wrapper  Dynamic DNS Service (Optional)

 So what have we achieved through the use of this SSH tunnel?

 Using an SSH tunnel we can protect our communications on networks that are not trusted  This is useful against passive attacks where the attacker is simply eavesdropping  There is still the possibility of Man-In-The- Middle attacks if you are not careful