Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.

Similar presentations


Presentation on theme: "Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung."— Presentation transcript:

1 Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung

2 What is SSH? SSH (Secure Shell) is a full replacement for rsh, rlogin, rcp, telnet, rexec, rcp and ftp Automatic authentication of users, no passwords are sent in clear text Secure remote login, file copying, and tunneling X11 and TCP connections( POP, IMAP, SMTP, HTTP )

3 When will I need SSH in CS? By June 18st 2001, telnet service will no longer be available on CS machines. Used to telnet into CS server from outside –Need SSH as a replacement for telnet, rlogin, rsh

4 What SSH clients are available for PCs, Macs, and Linux ? SecureCRT: http://www.vandyke.cohttp://www.vandyke.co –32bit version for Win98/98/2000/NT F-Secure: http://f-secure.comhttp://f-secure.com –Windows and Mac versions SSH Secure Shell: http://www.ssh.comhttp://www.ssh.com –Excellent free SSH client for Windows and Linux TeraTerm Pro: http://www.zip.com.au/~roca/ttssh.htmlhttp://www.zip.com.au/~roca/ttssh.html –A free SSH Client for Windows Mindterm: http://www.mindbright.se/mindterm/http://www.mindbright.se/mindterm/ –A java based client for Windows and Mac

5 Secure Shell

6 How to connect? Hostname: tin.cs.rit.edu Username: abc1234 Port Number: 22

7 Keys

8 SSH tunneling and Port Forwarding Port forwarding How to set up –Depend on the SSH client you use. ( SecureShell ) – www.ssh.com –“listen port” – client port number Ex) localhost:port# – “destination host” – server address tin.cs.rit.edu –“ destination port “ – server port number –“outgoing” and “incoming” tunnels need “outgoing” tunnels

9 Tunneling and Port Forwarding

10 Secure Shell

11 SSH on CS machines Located in.ssh2 directory Inside this directory –ssh-keygen2 –Passphrase: ******** –Again: ******* –Public key saved –Private key saved

12 SSH on CS Machines Once setup, need to create identification and authorization files for ssh2 –touch identification –touch authorization Edit these 2 files –Enter a private key in the identification file –Enter a public key in the authorization file

13 Conclusion Secure your data over the Internet. Secure your program over ftp. Use SSH service as soon as possible


Download ppt "Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung."

Similar presentations


Ads by Google