Thursday, April 22, 2010

Secure Shell

Secure Shell

Secure Shell is a solution that provides an open protocol for securing communication between machines. It is less complex and is a cheaper alternative as compared to many hardware solutions, e.g. VPN. SSH is a server/client solution which provides features like the command shell, file transfer and data tunneling services for TCP/IP applications. SSH provides secured authentication, encryption and data integrity to prevent security threats like password theft and man in the middle attacks.

Benefits of SSH

•User Authentication
SSH provides many alternatives that allow users or machines to be authenticated. The can range for basic shared-key authentication to secure technology like the public key authentication
•Host Authentication
Providing the client with host key and is used by the server to prove the client authenticity. This technique helps to guard again Man-in-the-middle attack.
•Data Encryption
The process of packaging of data using ciphers so provide privacy to the 2 communicating machines. SSH are able to provide this using common types of algorithms like DES, 3DES, Blowfish, AES and Twofish.
•Data Integrity
SSH ensures that the data sent are unaltered through any means within any transactions between machines. SSHv2 uses Message Authentication Code (MAC) which enhanced the current Cyclic Redundancy Check (CRC) provided by SSHv1.


Simple connection to SSH Server from Windows Client using Putty
1.Connect to the server from Windows using SSH Client (PuTTY)
• PuTTY can be downloaded from here:
_________________________________________________________
http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe
__________________________________________________________

• Configure PuTTY

1.Enter the Server IP address:
•The server IP address is: 172.20.130.28
2.Ensure that SSH is selected as the Connection Type
3.To save the configuration for easier connection in the future, give the Session a name and save it
4.Click Open to connect to the server through ssh connection.
5.Click OK to accept the (key?)
6.Login to the system


PuTTY configuration

PuTTY security Alert


2. Restrict Access
The following diagrams describe how it can be done to restrict certain hosts or domain to access the SSH server. All we have to do is to edit the hosts.deny file and add a line pointing to the source domain.


Editing of host.deny



contents of hosts.deny

No comments:

Post a Comment