DOC PREVIEW
SJSU CS 265 - SSH : The Secure Shell

This preview shows page 1-2-3-4-5 out of 14 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003OutlineIntroductionHistoryWhat is Secure Shell ?What is Secure Shell ? (Contd..)FeaturesSecurity MechanismSlide 9AuthenticationAuthentication (Contd..)SSH2 vs. SSH1ConclusionThank YouSSH : The Secure Shell ByRachana MaheswariCS265 Spring 2003Outline Introduction Brief History What is Secure Shell ? Features of Secure Shell Security Mechanism of Secure Shell SSH1 vs. SSH2 ConclusionIntroductionWidely used utilities to login through a network in Unix environment are telnet and rlogin  Problem - user's login name and password transmitted as clear text  Data transmission after login - also in clear text ! “SSH, the Secure Shell is a powerful, software-based approach to network security that provides a secure channel for data transmission through a network”HistoryDeveloped by Tatu Ylonen , Helsinki University of Technology, Finland in 1995 to prevent network attack against University networkPublished the protocol SSH-1 as an IETF (Internet Engineering Task Force) draft  Founded SSH communications security Ltd., in late 1995 (http://www.ssh.com) Later released SSH-2What is Secure Shell ? Powerful, convenient approach to protecting communications on a computer network  Provides a secure channel for data transmission  Not a command interpreter  Provides a secure pipe to open up a command interpreterWhat is Secure Shell ? (Contd..)Supports secure remote logins, secure remote command execution, secure file transfersHas a client server architecture – SSH server program and client programFeatures Privacy : via strong end-to-end encryption- DES, IDEA, BlowfishIntegrity : via 32 bit Cyclic Redundancy Check (CRC-32)Authentication : server via server’s host key, client usually via password or public key Authorization : controlled at a server wide level or per account basis Forwarding : encapsulating another TCP based service such as Telnet within an SSH sessionSecurity Mechanism Establishing the Secure Connection The client initiates the connection by sending a request to the TCP port of the SSH server Server reveals it's SSH protocol version to the client If the client and server decide their versions are compatible, the connection proceedsSSH server sends the following to the client - host key, the server key, a list of supported encryption, compression and authentication methods, and a sequence of eight random bytes Client checks identity of server by using the host key against known hosts databaseClient generates a session key and double encrypts it using the host key & server keyClient sends encrypted session key along with check bytes and acceptable algorithmEstablishing the Secure Connection (Contd..)Server then decrypts the encrypted session key it received Server sends a confirmation encrypted with this session keyClient receives confirmation, confirms server authenticationClient Authentication usually either by Password Authentication or Public key AuthenticationAuthenticationAuthentication (Contd..)Server confirms client authorization Generates a 256 bit random challenge, encrypts it with clients public key, and sends to client Client decrypts challenge, generates a hash value with a session identifier (commonly generated random string at beginning of session), and sends to server Server generates hash, if both match, session is authenticatedSSH2 vs. SSH1SSH2 has separate transport, authentication, and connection protocols.SSH1 has one monolithic protocolSSH2 has strong cryptographic integrity check using MAC, SSH1 has weak checking using CRC-32SSH2 supports any number of session channels per connection (including none),SSH1 exactly oneServers running SSH-2 can also run SSH-1 to take care of clients running SSH-1SSH2 allows more than one form of authentication per session, SSH1 allows only one.ConclusionSSH provides a secure channel for data transmission Provides a secure pipe to open up a command interpreter Latest version of SSH –SSH3Thank


View Full Document

SJSU CS 265 - SSH : The Secure Shell

Documents in this Course
Stem

Stem

9 pages

WinZip

WinZip

6 pages

Rsync

Rsync

7 pages

Hunter

Hunter

11 pages

SSH

SSH

16 pages

RSA

RSA

7 pages

Akenti

Akenti

17 pages

Blunders

Blunders

51 pages

Captcha

Captcha

6 pages

Radius

Radius

8 pages

Firewall

Firewall

10 pages

SAP

SAP

6 pages

SECURITY

SECURITY

19 pages

Rsync

Rsync

18 pages

MDSD

MDSD

9 pages

honeypots

honeypots

15 pages

VPN

VPN

6 pages

Wang

Wang

18 pages

TKIP

TKIP

6 pages

ESP

ESP

6 pages

Dai

Dai

5 pages

Load more
Download SSH : The Secure Shell
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view SSH : The Secure Shell and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view SSH : The Secure Shell 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?