1secure Shell
1secure Shell
MONIKA GUPTA
COT 4810
OUTLINE
What is SSH ?
History
Functions of Secure Shell ?
Elements of Secure Shell?
Architecture
How Secure Shell works
OUTLINE
Security Benefits ?
Why should we use SSH ?
Conclusion
References
What is SSH?
• SSH is a protocol for secure remote access
to a machine over untrusted networks.
• SSH is a replacement for telnet, rsh, rlogin
and can replace ftp.
• Uses Encryption.
• SSH is not a shell like Unix Bourne shell
and C shell (wildcard expansion and
command interpreter)
Features
Transmission is secure.
Transmission can be compressed.
No login password required
What’s wrong with telnet?
Sends all data in clear text.
Host between sender and receiver can see
what the traffic is.
Why should we encrypt data ?
Use the same password in more than one
place.
Do you want someone else to read your
mail?
History of SSH?
Created by Tatu Ylönen in July 1995, a
student of Helsinki University of
Technology
Free SSH1 version
Founded SSH Communications Security,
Ltd
SSH 2 version
Open SSH
Functions
Secure Command Shell
Port Forwarding
Secure file transfer.
Secure Command Shell
Allow you to edit files.
View the contents of directories.
Custom based applications.
Create user accounts.
Change permissions.
Anything can be done from command
prompt can be done remotely and
securely.
Port Forwarding
Powerful Tool.
provide security to TCP/IP applications
including e-mail, sales and customer
contact databases, and in-house
applications.
allows data from normally unsecured
TCP/IP applications to be secured.
Port Forwarding
Secure File Transfer
Secure File Transfer Protocol (SFTP) is a
subsystem of the Secure Shell protocol.
Separate protocol layered over the Secure
Shell protocol to handle file transfers.
SFTP
SFTP encrypts both the
username/password and the data being
transferred.
Uses the same port as the Secure Shell
server, eliminating the need to open
another port on the firewall or router.
Using SFTP also avoids the network
address translation (NAT) issues that can
often be a problem with regular FTP.
SFTP
An ideal use of SFTP is to fortify a server
or servers outside the firewall or router
accessible by remote users and/or
partners (sometimes referred to as a
secure extranet or DMZ).
Secure File Transfer Protocol
Secure extranet is one of the safest ways to
make specific data available to customers,
partners and remote employees without
exposing other critical company
information to the public network. Using
SFTP on your secure extranet machines
effectively restricts access to authorized
users and encrypts usernames, passwords
and files sent to or from them.
Components of Secure Shell
SSHD Server: A program that allows incoming
SSH connections to a machine, handling
authentication, authorization.
Clients: A program that connects to SSH servers
and makes requests for service
Session: An ongoing connection between a client
and a server. It begins after the client
successfully authenticates to a server and ends
when the connection terminates.
SSH Architecture
The user initiates an SSH connection. SSH attempts to
connect to port 22 on the remote host.
If successful, SSHD on the machine Remote forks off a
child SSHD process. This process will handle the SSH
connection between the two machines.