How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net.

Slides:



Advertisements
Similar presentations
How to Lock and Unlock Your Computer
Advertisements

SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast Allows both users to get jobs done, and also allows system administrators to sleep.
Sponsored by the National Science Foundation Running a class in GENI GENI Project Office.
Sponsored by the National Science Foundation Working with Collaborators.
Sponsored by the National Science Foundation Lab Zero: A First Experiment.
Sponsored by the National Science Foundation 1 Lab Zero – November 6, 2014 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you.
FTP Using FileZilla CS10001 – Computer Literacy. Step 1: Understanding the Interface Quickconnect Bar Message Log Area Local site navigation (either lab.
Basic Navigation in PeopleSoft 1. Logging in to the System PeopleSoft Navigation Tools.
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
Sponsored by the National Science Foundation Running a Class in GENI GENI Project Office.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Sponsored by the National Science Foundation Using GENI Wireless Resources Vic Thomas GENI Project Office.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Open your web browser and navigate to protechra.webex.com Open your web browser and navigate to protechra.webex.com.
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
Sponsored by the National Science Foundation 1 September 15, 2015 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you do the.
Sponsored by the National Science Foundation GENI Exploring Networks of the Future
TeamViewer – Remote Session Control By Phil Goff SIR Branch 116 July 21, 2011.
Sponsored by the National Science Foundation GENI Terminology.
Sponsored by the National Science Foundation GENI Terminology: How All the Pieces Fit Together Sarah Edwards GENI Project Office.
Sponsored by the National Science Foundation Running a Class in GENI Sarah Edwards GENI Project Office.
Sponsored by the National Science Foundation 1 GREESC15– May 25, 2015 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you do.
Sponsored by the National Science Foundation Lab Zero: A First Experiment using GENI Sarah Edwards, GENI Project Office.
Sponsored by the National Science Foundation 1 Last updated April 1, 2013 Are you ready for the tutorial? 1.Sign In 2.Grab a Worksheet 3.Did you do the.
Sponsored by the National Science Foundation Tutorial: Introduction to Omni Niky Riga GENI Project Office GREESC13 $ omni.py createsliver aliceslice myRSpec.xml.
Compiling a C Program. Before we can begin we must open a telnet session to phobos. There are a number of ways to do this, but the easiest is to click.
Sponsored by the National Science Foundation Getting Started With Your Own Experiment Sarah Edwards, GENI Project Office.
Sponsored by the National Science Foundation University of Massachusetts Amherst November 2 nd, 2011 GENI DiCloud.
Sponsored by the National Science Foundation Cluster D Working Meetings GENI Engineering Conference 5 Seattle, WA July ,
Sponsored by the National Science Foundation GENI Experimenter Portal Service Developers Roundtable GENI Engineering Conference 16 Salt Lake City, Utah.
Sponsored by the National Science Foundation 1 ICDCS13: July 8, 2013 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you do the.
PUTTY. WHAT IS IT?? Putty is a free SSH client for windows. The users for this application will probably have a fair amount of computing experience.
Sponsored by the National Science Foundation Lab Zero: A First Experiment using GENI.
Behind the Scenes of GENI Experimentation Understanding GENI AM API and RSpec Sponsored by the National Science Foundation
Telnet allows you to log in remotely to other computers connected to the Internet (but only computers that are set up to be logged in to). Once logged.
Connecting to Linux at UMBC by using Tera Term SSH Presented by David Nardozzi.
Engineering H192 - Computer Programming Gateway Engineering Education Coalition Lect 20AP. 1Winter Quarter File Transfer Lecture 20A.
Sponsored by the National Science Foundation 1 GREE SC: June 24, 2013 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you do.
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
Behind the Scenes of GENI Experimentation Understanding GENI AM API and RSpec Sponsored by the National Science Foundation
Hands-on security Angelines Alberto Morillas Ciemat.
Sponsored by the National Science Foundation Cluster D Spiral 1 Goals and Tasks July 2,
FTP Using FileZilla CS10001 – Computer Literacy. Step 1: Understanding the Interface Quickconnect Bar Message Log Area Local site navigation (either lab.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Sponsored by the National Science Foundation Lab Zero: A First Experiment using GENI Sarah Edwards GENI Project Office.
Getting Started with the Virtual Computing Lab. Click on the URL:
Sponsored by the National Science Foundation Today’s Exercise.
Sponsored by the National Science Foundation 1 Lab Zero – October 20, 2014 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you.
DiskGo! USB Flash Drive How-to-Use Guide. Capacity The DiskGo! USB Flash Drive will hold 64MB of data. 64MB of information is equivalent to approximately.
Behind the Scenes of GENI Experimentation An Introduction to GENI Tools Sponsored by the National Science Foundation.
Sponsored by the National Science Foundation GENI Cloud Security GENI Engineering Conference 12 Kansas City, MO Stephen Schwab University of Southern California.
Sponsored by the National Science Foundation 1 Lab Zero – March 14, 2014 Are you ready for the tutorial? 1.Grab a Worksheet and instructions 2.Did you.
John DeHart Computer Science & Engineering Washington University GEC7: SPP Tutorial User Handouts.
Sponsored by the National Science Foundation Systematic Experimentation Sarah Edwards GENI Project Office.
PuTTY Introduction to Web Programming Kirkwood Continuing Education by Fred McClurg © Copyright 2016, All Rights Reserved ssh client.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Sponsored by the National Science Foundation GENI Terminology Sarah Edwards, GENI Project Office Violet Syrotiuk, Arizona State University.
Sponsored by the National Science Foundation 1 GEC16: March 19, 2013 Are you ready for the tutorial? 1.Sign In 2.Grab a Worksheet 3.Did you do the pre-work?
1 Free Electrons. Kernel, drivers and embedded Linux development, consulting, training and support. http//free-electrons.com SSH Thomas Petazzoni Free.
OpenSSH – Public Key Authentication ● Jonathan Schipp ● Dubois County Linux User Group ● Nov 7 th 2010 ● jonschipp (at) gmail.com.
Lab Zero: A First Experiment using GENI
Using iLocker.
How to Fix Windows 10 Update Error 0x ?.
GENI Terminology Sponsored by the National Science Foundation.
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
PGA TOUR Security Update
Windows Professional xp Microsoft® ® Copyright ©
Presentation transcript:

How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16,

SSH with a password ssh local> ssh password: ######## Welcome to remote! exit local> ssh password: ######## Hash of password stored on each remote machine User enters password once for each connection to each machine *nix-based system (Windows behavior may vary) Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16,

SSH with a private key local> ssh-add ~/.ssh/id_rsa Enter passphrase for ~/.ssh/id_rsa: ######## local> ssh Welcome to remote! exit local> ssh Welcome to remote2! exit local> ssh Welcome to remote3! exit ssh Public key is stored on each remote machine User enters passphrase to unlock private key for all connections to all machine Private key is stored only on local machine *nix-based system (Windows behavior may vary) Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16,

SSH with a private key is both easier to use and more secure Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16,

You should never be prompted for a password to log into a GENI compute node. If you are, something has always gone wrong. Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16,

GENI Expiration and Renewal Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16,

slice expiration time ≤ project expiration time each resource expiration time ≤ slice expiration time each resource expiration time ≤ aggregate’s max expiration project slice resource (optional) project expiration time slice expiration time resource expiration time now To extend the lifetime of your resource reservation, you must renew the slice and all resources resource Sponsored by the National Science Foundation Cloud Security Pedagogy Workshop – July 16, 2015