NTP, Syslog & Secure Shell

Slides:



Advertisements
Similar presentations
Presented by W1BAW Bruce Wattendorf. What is a Raspberry PI A $35 computer with out a monitor, keyboard, mouse but they all can be added.
Advertisements

©2009 Justin C. Klein Keane PHP Code Auditing Session 3 – Tools of the Trade & Crafting Malicious Input Justin C. Klein Keane
Lab 1. Overview – Why this lab Get to know the lab environment Get to know the lab environment Get a feeling for Linux Get a feeling for Linux Get a feeling.
CCNA 2 v3.1 Module 2.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Remote access and file transfer Getting files on and off Bio-Linux.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
VMs Virtual Machines. VM What is a VM  Virtual Machine  Software implementation of a machine running on another machine The VM may or may not resemble.
ITIS 2110 Class # No home network devices devices devices devices devices devices devices 9.
CSE 390a Editing and Moving Files
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Windows PostgreSQL installation. Pre-requisites Define a local non-administrative Windows account (eg. postgres) Must install on Console, not through.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Unix and Samba By: IC Labs (Raj Kidambi). What is Unix?  Unix stands for UNiplexed Information and Computing System. (It was originally spelled "Unics.")
Lab 11 Overview Windows Server Last Labs Lab 12  Cisco Firewall.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
Lab 10 Overview DNS. DNS name server Set up a local domain name server . is the root domain .lab is the WH302 lab’s TLD (top level domain)  hades.lab.
Linux Services Configuration
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
SCSC 455 Computer Security Chapter 3 User Security.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Lab 8 Overview Apache Web Server. SCRIPTS Linux Tricks.
ITIS  Today’s Notes  NFS in the lab  Lecture: ▪ Linux II ▪ vi  Lab 2.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
CS 120 Extra: The CS1 Server Tarik Booker CS 120.
Lab 11 Overview Windows Server Last Labs wk14
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
Security with SSH Unix System Administration Workshop AfNOG 2007 Hervey Allen.
VMware ESX and ESXi Module 3.
RASPBERRY PI WORKSHOP.
Ssh: secure shell.
Lab 05 Firewalls.
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
Chapter 5 Linux Services
FTP Lecture supp.
Technology Envioronment
Part 3 – Remote Connection, File Transfer, Remote Environments
Getting SSH to Work Between Computers
Lab 1 introduction, debrief
Creating a Windows Server 2012 R2 Datacenter Virtual machine
Creating a Windows Server 2016 Datacenter Virtual machine
Lab 10 Overview DNS.
Bomgar Remote support software
Telnet/SSH Connecting to Hosts Internet Technology.
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Lab: ssh, scp, gdb, valgrind
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
Hardware Appliance Installation and Configuration
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4)
CGS 3175: Internet Applications Fall 2009
Remote Computing Services Cloud connection Distributed system
Lecture9: Embedded Network Operating System: cisco IOS
Operating System Kernel Compilation
Lecture9: Embedded Network Operating System: cisco IOS
File Transfer Protocol
Presentation transcript:

NTP, Syslog & Secure Shell ITIS 3110 Lab 3 NTP, Syslog & Secure Shell

USB and Debian CLI USB mounts do not automount See 2110-3110AdditionalInfo (Helpful Information) near the bottom for instructions on how to have it automount http://webpages.uncc.edu/~tkombol/Classes_2017 _Spring/ITIS%202110-3110%20Common/2110- 3110AdditionalInfo.htm

NTP Create your own NTP server on the Debian VM You will set up the Debian server to sync with the lab’s NTP server Use your CentOS VM and Pi clients to sync with your Debian server Hint: You can sync manually to any server and then run the daemon to stay in sync

Syslog Create a Debian syslog server and allow other “syslog devices” to send their logs to Debian Configure your CentOS VM and Pi to send all logs to your Debian server Remember: Never use an editor (e.g. nano or vi) to view system logs! You do not want to edit these files, just view them

SSH clients and servers Almost all Linux distros come with an SSH client installed and configured Most Linux distros do not come with an SSH server installed or at least configured Why? Will need to install and configure a server on each workstation or server you want to ssh to Applies for scp and sftp also The machine you copy to or from must have the daemon installed and running

OpenSSH Server Any VMs you wish to securely remote log into must have an ssh server: sshd (e.g. open-ssh) You CANNOT control a remote computer without an ssh server running on that computer ssh server not typically installed as default This is the machine you are “remoting” to Your host Linux image may only have the ssh client Typical default This is the machine you are “remoting” from Suggest putting the ssh server on both VMs and Pi Later you may remote log from either machine to the other

OpenSSH Server Note: the terms server and client are relative to who is logging in and who is being logged into Client is who is logging in Server is the machine logging into

SSH Interaction REMEMBER: SSH interaction between hosts is: FROM an ACCOUNT (uid) on one computer TO an ACCOUNT (uid) on another computer For key authentication to work this means: The proper files need to be located in the proper location for every account you intend to use as a server and as a client The files need to be in the proper directory/file for each account on each machine The key pairs are for specific account on one machine to log onto a specific account on a remote machine See supplemental document for description of files and locations

Key Authentication Towards the end of lab, you will disable password authentication Prove the Key Authentication works Make sure your submission shows this You may re-enable password authentication after done with lab Only if you want to

Subnet IDs Posted on post in lab On Lab’s Web page for 3110

End goal SSH Start all machines Debian server CentOS and Pi SSH server CentOS and Pi SSH client Optional: SSH server Start all machines Access Debian Server from the CentOS or Pi Clients Never have to switch to the Debian

Notes Pi added to this lab May want to add SSH server to the Pi NTP Syslog SSH client May want to add SSH server to the Pi Configure a key pair for CentOS  Pi Then CentOS can control all the machines! Configure a key pair for Pi  Debian Then Pi can control the Debian server Default prompt for the terminals are very handy Tells: Which machine you are connected Which ID Current PWD

Notes: When configuring the Pi there is an option to enable the SSH server Can enable or disable later with: sudo raspi-config Go to Advanced Options  SSH Enable OK Finish Reboot the Pi

Last Notes The secure client (the one using ssh, scp or sftp to get/retrieve) Uses the ssh client Usualling installed and configured by default The secure target (the remote machine) Must have the secure daemon installed and running Usually sshd Usually it is not installed on the target Must be installed and configured

Last Notes Remote Access Methods Userid/password Keypair Must have a valid userid and pw on the target Can be disabled Keypair Must have the proper key data on the client and target Identifies valid clients Identifies valid targets No need for a password if the keys are set up properly Keypair and PW For the really paranoid Must have the keys set up properly Must supply another password for the pair Different than the normal UID/PW

Last Notes Some commands are struck out Watch out for Word “helping” “Old” command Left so you can see the old way May be valid on your VMs or other Linux machines service xxxx yyyy is the new improved way Watch out for Word “helping” May have capitalized some commands in the doc

Get Started