Prezentare

4
1.Definitie SSH SSH = Secure SHell SSH este un protocol care permite crearea unei sesiuni de lucru la distanta, transferul de fisiere si crearea unor canale de comunicatie pentru alte aplicatii, toata transmisia fiind sigura impotriva atacurilor intrusilor. Confidentialitatea transmisiei este asigurata prin criptare. Integritatea este asigurata prin trimiterea unor sume de control criptografice. Autentificarea serverului se face prin criptografie asimetrica, serverul avand o cheie secreta si clientii dispunand de cheia publica corespunzatoare. Autentificarea clientului se face fie prin criptografie asimetrica, ca si in cazul autentificarii serverului (dar bineinteles folosind alta pereche de chei), fie cu parola clasica, data de client dupa autentificarea serverului. SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary.[1] There are several ways to use SSH; one is to use automatically generated public- private key pairs to simply encrypt a network connection, and then use password authentication to log on. Another is to use a manually generated public-private key pair to perform the authentication, allowing

Transcript of Prezentare

Page 1: Prezentare

1.Definitie SSHSSH = Secure SHell

SSH este un protocol care permite crearea unei sesiuni de lucru la distanta, transferul de fisiere si crearea unor canale de comunicatie pentru alte aplicatii, toata transmisia fiind sigura impotriva atacurilor intrusilor.

Confidentialitatea transmisiei este asigurata prin criptare. Integritatea este asigurata prin trimiterea unor sume de control criptografice. Autentificarea serverului se face prin criptografie asimetrica, serverul avand o cheie secreta si clientii dispunand de cheia publica corespunzatoare. Autentificarea clientului se face fie prin criptografie asimetrica, ca si in cazul autentificarii serverului (dar bineinteles folosind alta pereche de chei), fie cu parola clasica, data de client dupa autentificarea serverului.

SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary.[1] There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection, and then use password authentication to log on.

Another is to use a manually generated public-private key pair to perform the authentication, allowing users or programs to log in without having to specify a password. In this scenario, anyone can produce a matching pair of different keys (public and private). The public key is placed on all computers that must allow access to the owner of the matching private key (the owner keeps the private key secret). While authentication is based on the private key, the key itself is never transferred through the network during authentication. SSH only verifies whether the same person offering the public key also owns the matching private key. In all versions of SSH it is important to verify unknown public keys, i.e. associate the public keys with identities, before accepting them as valid. Accepting an attacker's public key without validation will authorize an unauthorized attacker as a valid user.

Autentificarea si datele sint transmise in clar. Orice host de pe traseu poate intercepta comunicatia.

Page 2: Prezentare

2 Istorie si vulnerabilitati

In 1995, Tatu Ylönen, a researcher at Helsinki University of Technology, Finland, designed the first version of the protocol (now called SSH-1) prompted by a password-sniffing attack at his university network. The goal of SSH was to replace the earlier rlogin, TELNET and rsh protocols, which did not provide strong authentication nor guarantee confidentiality. Ylönen released his implementation as freeware in July 1995, and the tool quickly gained in popularity. Towards the end of 1995, the SSH user base had grown to 20,000 users in fifty countries.

In December 1995, Ylönen founded SSH Communications Security to market and develop SSH. The original version of the SSH software used various pieces of free software, such as GNU libgmp, but later versions released by SSH Communications Security evolved into increasingly proprietary software.

It is estimated that, as of 2000, there were 2 million users of SSH.[6]

5. Command Shell SecurizatA shell in computing provides a user interface for access to an operating system's kernel services. "Shell" is also used loosely to describe applications, including software that is "built around" a particular component, such as web browsers and email clients that are, in themselves, "shells" for HTML rendering engines. The term "shell" in computing, being the outer layer between the user and the operating system kernel, is synonymous with the general word "shell".

MAC = mac( key, seq. number | clear packet )– sequence number is implicit, not sent with the packet– sequence number is represented on 4 bytes– sequence number initialized to 0 and incremented after each

packet– it is never reset (even if keys and algs are renegotiated later)

Bibliografie

Stabilirea conexiunii : Servicii SSH :Autentificarea clientului SSH :http://www.cs.ubbcluj.ro/~rlupsa/edu/retele-2003/c5.html

Istorie si vulnerabilitati :

Page 3: Prezentare

http://ham.elcom.pub.ro/asi/slides/ssh-sftp-rev1.3.pdf http://en.wikipedia.org/wiki/Secure_Shell