SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

18
SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD

Transcript of SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Page 1: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

SSH and SSL

CIT304

University of Sunderland

Harry R. Erwin, PhD

Page 2: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Resources

• Daniel J. Barrett and Richard E. Silverman, 2001, SSH, the Secure Shell, O’Reilly, ISBN: 0-596-00011-1

• Eric Rescorla, 2001, SSL and TLS: Designing and Building Secure Systems, Addison-Wesley, ISBN: 0-201-61598-3

Page 3: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

The Problem

• IPv4 is insecure. Most TCP/IP services are unencrypted. This allows anyone to monitor and reconstruct connection traffic on the internet.

• The following needs can be identified:– Encrypted connections between parties known to each

other.

– Third-party authentication and encrypted connection establishment when parties are not known to each other.

Page 4: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Solutions

• SSH to support encrypted sessions

• SSL to provide trusted third-party authentication and to support encrypted sessions.

Page 5: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

SSH

• “Secure shell”

• Transparent encryption.

• Modern, secure encryption algorithms

• Reliable, fast, and effective

• Client/server interaction

• Eliminates .rhosts and hosts.equiv

Page 6: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Services Provided

• Replaces:– rsh and telnet with ssh– rlogin with slogin– rcp with scp– ftp with sftp

• Protocols– ssh-1– ssh-2

Page 7: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

SSH1 Authentication Mechanisms

1. Kerberos

2. Rhosts (trusted host authentication, insecure)

3. RhostsRSA (trusted host authentication, insecure)

4. Public-key (RSA)

5. TIS

6. Password (various flavors, relatively insecure)

Page 8: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

SSH2 Authentication Mechanisms

1. Public-key (DSA, RSA, OpenPGP)

2. Hostbased

3. Password

Page 9: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Ciphers

• SSH1– 3DES, IDEA, ARCFOUR (alleged RC4), DES

• SSH2– 3DES, Blowfish, Twofish, CAST-128, IDEA,

ARCFOUR

Page 10: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Port Forwarding

• SSH can forward or tunnel ports, allowing you to run insecure services securely.

ssh -L 3002:localhost:119 news.yoyo.com

Page 11: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

A Simple Example

• ssh -l harry harry.sunderland.ac.uk

• This allows me to log into [email protected]

• Another way of doing the same thing is

• ssh [email protected]

Page 12: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Using scp

• scp [email protected]:myfile afile• This transfers myfile from my home directory on

harry.sunderland.ac.uk to afile locally.• You can also use sftp similarly to ftp.

Page 13: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Threats Countered

• Eavesdropping

• DNS and IP Spoofing

• Connection Hijacking

• Man-in-the-Middle Attacks

• Insertion Attack

Page 14: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

SSL

• Secure Sockets Layer• An authentication and encryption technique that

provides security services to TCP by a socket-style API.

• Relies on certificates issued by a trusted third party.

• Invented by Netscape.• Is slowly being replaced by TLS (Transport Layer

Security)

Page 15: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

Services Provided• Secure http• pop• imap• smtp• ftp• rmi• corba• iiop• telnet• ldap

Page 16: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

SSL Functions

• Confidential transmission

• Message integrity

• Endpoint authentication

Page 17: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

How It Works

• An understanding of how SSL works is necessary to use it safely.

• Uses public key (asymmetric) cryptography.

• Trusted third parties (Certificate Authorities) provide the certificates that contain the public keys.

• Supports many encryption algorithms.

Page 18: SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.

SSL-Enabled UNIX Clients

• curl, • ethereal, • ettercap, • lynx, • stunnel, • gabber, • links, • mutt,

• xchat,

• bitchx,

• lftp,

• neon,

• openldap,

• openslp,

• pine,

• various database managers.