0% found this document useful (0 votes)
52 views

SSH Server

This document provides an overview of the SSH protocol and a guide for setting up SSH client and server connections. It describes SSH as a secure protocol for remote access that uses encryption. The document then outlines the steps to install and configure an SSH server on OpenSuse Leap 15, including necessary software, firewall configuration, and key server configuration files. It also describes how to set up SSH clients on Linux and Windows systems to connect to the server.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

SSH Server

This document provides an overview of the SSH protocol and a guide for setting up SSH client and server connections. It describes SSH as a secure protocol for remote access that uses encryption. The document then outlines the steps to install and configure an SSH server on OpenSuse Leap 15, including necessary software, firewall configuration, and key server configuration files. It also describes how to set up SSH clients on Linux and Windows systems to connect to the server.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SSH PROTOCOL

PhD. Alcides Montoya Canola, Est. Carlos Andres Ballesteros


Universidad Nacional de Colombia - sede Medellin

Abstract
This guide will develop the procedure that will allow you to practice
the knowledge acquired in the theoretical class of server management.
The topic to be developed is SSH.

1 Introduction
SSH TM (or Secure SHell) is a protocol that facilitates secure communications
between systems using a client / server architecture and allows users to connect
a host remotely. Unlike other communication protocols, communication such as
FTP or Telnet, SSH, connection session, it is impossible to obtain unencrypted
passwords.
SSH is designed to replace older and less secure methods for records remotely
in another system through the command shell, such as telnet or rsh. A related
program, the scp, replaces other programs to copy files between hosts as rcp.
Since these old applications are not related to the client and the server, although
use them as much as possible. The use of secure methods to remotely register
other systems reduces security risks for both the client system and the remote
system.[2].

Figure 1: SSH protocol

2 Characteristics of SSH
The SSH protocol provides the following types of protection:
• After the initial connection, the client can verify that he is connecting to
the same server to which he was previously connected

1
• The client transmits its authentication information to the server using
robust 128-bit encryption

• All data sent and received during the session is transferred through 128-bit
encryption, which makes them extremely difficult to decipher and read.
• The client has the possibility of forwarding X11 applications [1] from the
server. This technique, called forwarding by X11, provides a secure means
to use graphical applications over a network.

Figure 2: How does SSH

3 Development of Practice
The development of the practice will take place in the distribution of Open Suse
Leap 15, it is clear that this practice can be extended to other distributions
taking into account their respective changes. s

3.1 The server side


3.1.1 Necessary logical equipment.
we must install the SSH server, if it is already installed, we must update it, for
this, we write the following commands in the console.

Execute the following to install the service:

2
3.1.2 Start service and add the service to the system boot.
SSH is a service that must be enabled once it has been configured. And it must
be restarted when a new configuration has been made, for it to execute the
following commands.

Execute the following to enable the service at startup:

to know if the service is enabled write the following command:

to know the state to be service execute the following:

3.1.3 Necessary modifications in the firewall.


Clients on all subnets must be able to communicate with the server. To define
the interfaces that the SSH server should listen to, adjust the firewall accord-
ingly, for this we execute the following commands.

Execute the following to configure the firewall:

Run the following to reload the firewall:

3.1.4 Files and configuration directories.


• /etc/ssh: in this directory you will find the ssh server configuration files.
• /etc/ssh/sshd config: in this file the ssh server is configured

In case you have modified /etc/ssh/sshd config while the SSH


server was running, you need to restart it for the changes to be-
come active.

3
Modify the file as shown below:

For more information


visit the following web page www.ssh.com/ssh/sshd config/ or consult the
ssh manual

3.2 The client side


On the client side we can find several operating systems, in this practice we will
approach Linux with the OpenSUSE Leap 15 distribution, and Windows 7 and
up.

There are several methods to be conceded to the server as a client, one of


them is using software, codes pedasos among others, there is a software that
is very welcome and used by several operating systems including Windows and
Linux, its name is puTTY which is an SSH and Telnet client with which we can
connect to remote servers by starting a session in them that allows us to execute
commands. To download puTTY visit the following website www.putty.org

3.2.1 For GNU/Linux


Files and configuration directories.
• /etc/ssh/ssh config: in this file the ssh client is configured

4
Modify the file as shown below:

To access from the client machine write the following in konsola:

3.2.2 For Windows


To be able to access from the windows console it is necessary to add some files to
the windows folders, for them we will download and unzip the file corresponding
to the windows version that is being used, together with the guide.
in this case for a Windows 32 bit computer, we go to the following directory:

and finally we copy and paste all the files that came compressed in this folder.
To access the service we open a command console (cmd) by typing Windows +
R followed by an Enter,

4 Exercise
Install and configure the SSH server, as shown throughout the development of
the practice, mount a network and test it.

References
[1] sshsecurity/openSUSE Leap 15.0”, doc.opensuse.org 2018
[2] SSH protocol”, web.mit.edu 2018

You might also like