Getting SSH to Work Between Computers

Slides:



Advertisements
Similar presentations
Sonny J Zambrana University of Pennsylvania ISC-SEO November 2008.
Advertisements

1 Automated SFTP Windows and SUN Linux and SUN. 2 Vocabulary  Client = local=the machine generating the SFTP request  Server = remote = the machine.
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Computer Organization Tools Computer Organization 1 © WD McQuain Programming Tools Most of the programming assignments will require using.
Introduction To The Course Network Architecture Hervey Allen Chris Evans Phil Regnauld September 3 - 4, 2009 Santiago, Chile.
Jun-15 1 Management Information Systems Class Web Server Usage Instructions.
File Transfer and Use of Clear Text Passwords Update NERSC Users Group Meeting Stephen Lau NERSC June 21, 2015.
Virtual Machine and UNIX. What is a VM? VM stands for Virtual Machine. It is a software emulation of hardware. By using a VM, you can have the same hardware.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Remote access and file transfer Getting files on and off Bio-Linux.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
A crash course in njit’s Afs
One to One instructions Installing and configuring samba on Ubuntu Linux to enable Linux to share files and documents with Windows XP.
Help session: Unix basics Keith 9/9/2011. Login in Unix lab  User name: ug0xx Password: ece321 (initial)  The password will not be displayed on the.
SSH. Review 1-minute exercise: Find the open ports on you own VM [Good] nmap [Better] netstat -lpunt.
The Saigon CTT Chapter 16 Remote Connectivity. The Saigon CTT  Objectives  Explain : telnet rsh ssh  Configure FTP.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
Internet of Things with Intel Edison Compiling and running Pierre Collet Intel Software.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
| nectar.org.au NECTAR TRAINING Module 10 Beyond the Dashboard.
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Workbook 10 Chapter 8. Remote Shell Commands Pace Center for Business and Technology 1.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
The Secure Shell Copyright © Software Carpentry 2011 This work is licensed under the Creative Commons Attribution License See
Tools: SSH, SFTP, dunx1, Nvu David Tristano Drexel IRT Dept.
SSH Tricks for CSF Slide 1 NEbraskaCERT SSH Tricks Matthew G. Marsh 05/21/03.
Linux Services Configuration
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
| nectar.org.au NECTAR TRAINING Module 10 Beyond the Dashboard.
SCSC 455 Computer Security Chapter 3 User Security.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Using Grsync with Ubuntu Presented by Dave Mawdsley, DACS Member, Linux SIG August 20, 2008 (making rsync easy with a memory key or a server)
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
OpenSSH – Public Key Authentication ● Jonathan Schipp ● Dubois County Linux User Group ● Nov 7 th 2010 ● jonschipp (at) gmail.com.
Security with SSH Unix System Administration Workshop AfNOG 2007 Hervey Allen.
SSH - Lab We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2.
Interacting with the cluster ssh, sftp, & slurm batch scripts
Presented by Dave Mawdsley, DACS Member, Linux SIG February 20, 2013
Using Crontab with Ubuntu
Secure services Unit-IV CHAP-1
Holland Computing Center STAT802 Create and access Anvil Windows 10 SAS instance 01/23/2017.
Ssh: secure shell.
Chapter 7: Using Network Clients
Programming Tools Most of the programming assignments will require using the C language. We will use a current version of the GCC C compiler. What’s GCC?
Presented by Dave Mawdsley, DACS Member, Linux SIG Member
NTP, Syslog & Secure Shell
Chapter 5 Linux Services
SECURE SHELL MONIKA GUPTA COT 4810.
Using pktstat with Bash
Discussion about 'Shellshock' fixes--Ubuntu and OS X
FTP - File Transfer Protocol
Using Clam Anti-Virus with Ubuntu
Launchpad & Bazaar Use Launchpad to work on team projects
Three modes of Hadoop.
ECE544: Software Assignment 3
Using Tweak to Study Ccrypt
File Transfer Olivia Irving and Cameron Foss
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Understanding Cisco Router Security
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Introduction Paul Flynn
Remote Computing Services Cloud connection Distributed system
Programming Tools Most of the programming assignments will require using the C language. We will use a current version of the GCC C compiler. What’s GCC?
DIBBs Brown Dog Tutorial Setup
Presentation transcript:

Getting SSH to Work Between Computers (Establishing Permissions for SSH) Presented by Dave Mawdsley, DACS Linux SIG July 16, 2014

1 What is Secure Shell? Secure Shell (SSH) is a public/private key encrypted transfer method of authorization. The private key stays with the source computer and the public key is shared with destination computers. This tutorial next details the procedures and steps to set up SSH between a source computer and a destination computer.

2 Install SSH On each computer, start the terminal command line interface. Ubuntu SSHD Installation Type the following root command to install both ssh client and server: # sudo apt-get install openssh-server openssh-client so that both can use ssh in either direction. Next from the source computer generate the private & public key pair using root: # ssh-keygen -t rsa

The Private & Public Keys 3 The Private & Public Keys After generating the public and private keys with: # ssh-keygen -t rsa ... A sample of what you'll see: Generating public/private rsa key pair. Enter file in which to save the key (/root/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /root/.ssh/id_rsa. Your public key has been saved in /root/.ssh/id_rsa.pub. The key fingerprint is: cb:17:d8:17:b3:ff:9f:b5:a1:c6:1c:cb:4f:ba:5e:7f root@machine01

SSHD Configuration 4 SSHD Configuration Your server is ready by default. Just test it from your home computer or from same system with the root command: # ssh localhost

5 Moving the Public Key To work, the public key id_rsa.pub of the source computer must be stored in the destination computer's .ssh folder to prevent a password prompt when a command that uses it occurs. Further, I suggest that id_rsa.pub should first be stored as key.txt in the destination computer's <user home folder>/.ssh --and then it must be added to the executable authenticated_keys text file in that same folder. While in that .ssh folder, I suggest the following append: $ cat key.txt >> authenticated_keys (Note: if the file authenticated_keys isn't present, the file will be made.)

Final Thoughts 6 1. Everything depends upon the public and private key pair of SSH. 2. The private key (without the .pub) should never be shared. Both public and private keys should be stored preferably on a memory key in a banksafe deposit box. This is particularly important if many computers must rely on the public key. 3. The use of scp, sftp or rsync requires that ssh be used even if it is not nvoked in the command string such as rsync -r -t -p -o -v –progress -l /home/madmod/Desktop/pw/ /media/ABBC-DC6D/Documents/pw/ 4. It's considered risky to allow ssh root@143.17.204.5 if the destination is a server. SSH logins using root to servers create a path for possible intruder logins. 5. The private key id_rsa represents the “identity” or “user” of single computer which is at a base or primary level of absolute trust.

Getting SSH to Work Between Computers (Establishing Permissions for SSH) This Presentation 'sshstart.odp' can be downloaded from http://madmod.com/freebies.html