Shell Protocols
Download
Report
Transcript Shell Protocols
Shell Protocols
Elly Bornstein
Hiral Patel
Pranav Patel
Priyank Desai
Swar Shah
Agenda
Introduction
R* Utilities
Secure Shell Protocol
Architecture of SSH
How SSH works
Features and Advantages
Limitations
Security Concerns
Tools
Conclusion
Introduction
What is Shell?
What are Shell Protocols?
R* Utilities
R* Utilities
Rlogin - allows users to log in remotely
Rcp - provides remote file transfer.
Rsh - executes a remote command through the rshd
daemon
Rexec - executes a remote command through the
rexecd daemon
R* Utilities Security Concerns
Secure Shell Protocol (SSH)
•
•
•
What is SSH?
Why SSH?
Different versions of SSH
•
•
SSH-1
SSH-2
Secure Shell Architecture
Where does SSH lie in the protocol
hierarchy?
[Figure: Secure Shell operates at the application layer of the TCP/IP stack,
Source: www.ssh.com]
Secure Shell - Architecture
SSH Architecture
consists of 3 components:
The Transport Layer Protocol [SSH-TRANS]
The User Authentication Protocol
[SSH-USERAUTH]
The Connection Protocol [SSH-CONNECT]
The complete view of SSH Architecture – arch.doc
SSH Layers
SSH-TRANS
Server Authentication
Each Server must have a Host Key
Client must have prior knowledge of host keys –
local database, trusted certification authority
Danger – Man in the middle attack
Confidentiality
Integrity
Key-Exchange
Compression [optional]
SSH Layers – [contd.]
SSH-USERAUTH
Authenticates Client-Side User
Authentication Methods:
1. Password-Based Authentication
2. Public-Key Based Authentication
3. Host-Based Authentication
4. GSSAPI Authentication Methods
SSH Layers – [contd.]
SSH-CONN
Multiplexes Encrypted Channel into several
logical channels
Provides services such as:
Multiple interactive and non-interactive sessions
Managing X, Port and Agent forwarding
Terminal handling
Remote program execution
How SSH works?
Host Identification
Encryption
User Authentication
Access to desired services
Relate back to arch.doc
Features and Advantages
SSH and SFTP for secure file transfer
SSH and SCP for alternative to RCP
Port forwarding and Tunneling
Support terminal protocols for remote
administration
Secure proxy connection for Internet browsing
Authentication methods: Kerberos, SecureID,
RSA, etc.
Limitations
Port ranges can’t be forwarded
Poor performance on older computers
Graphical applications can be started,
but cannot be seen
Child processes are not killed when the
user logs out
Security Concerns
Man-in-the-middle attack
Denial of Service
Message replay attack
Data integrity
Tools
Multi-platform
PuTTy
Conch
Windows
SecureCRT
WinSCP
Unix-like OS
LSH
OpenSSH
Conclusion
Provides secure data transfer across the
network
Provides the space for extensibility and
options for using different algorithms
Most of the limitations and probable
threats can be avoided by using proper
algorithms and policies
Thank You