SlideShare a Scribd company logo
A. SARANG
INTRODUCTION
TO
SSH & PGP
Agenda
 Dial Up & broadband connections
 Introduction to SSH protocol & applications
 SSH-TRANS
 Client- Server Authentication
 SSH configuration
 Public & Private key pair generation
 Digital Signatures
 Use of SSH in Port Forwarding
 SSH in subversion control
 Introduction to PGP protocol & applications
 Email compatibility of PGP
A few years back ..
 DIAL-UP connection
Dial up connection
 Passwords were sent over
phoneline or LAN.
 Was it secure ?
The present day..
 Broadband connection
Broad band connection
 Passwords go through ISPs/
untrusted networks.
 How can there be a secure way of
sending passwords across the
internet ?
The need for encryption
 This can be solved by encrption of
the data sent over the untrusted
networks .
 This improves the strength of the
authentication mechanism people
use to login.
 We call this mechanism as …
SSH
Secure SHell
protocol & applications
SSH
 Replaces less secure telnet &
rlogin* programs.
 Uses public key cryptography to
authenticate remote PCs.
 *rlogin is a software utility for Unix-like computer operating
systems that allows users to log in on another host via
a network, communicating viaTCP port 513.
SSH can
 Execute commands & transfer files
(like unix rsh & rcp commands).
 Provides strong client/server
authentications
 Message integrity.
SSH can protect against ..
 Manipulation of data at intermediate
elements in the network.
 IP address spoofing where attack
hosts pretends to be trusted host by
sending packets with source address
of trusted hosts
 DNS spoofing.
SSH will not protect against ..
 A compromised root account .
 Insecure home directories
 Eg : if an attacker tries to modify
files in the home directory.
SSH version 2 protocols
 SSH-TRANS , a transport layer
protocol
 SSH-AUTH , an authentication
protocol.
 SSH-CONN , a connection
protocol.
 SSH-AUTH & SSH-TRANS are used for remote
login.
SSH - TRANS
 Provides encrypted channel
between client & server machines.
 Runs on top of TCP connection.
SSH-TRANS mechanism
 Client authenticates server using RSA
algorithm.
 After authentication , it establishes a
session key to encrypt data sent over
the channel.
 Message integrity check is done for
all data exchanged over the channel.
 Public key is owned by the server .
 How come client possesses the
server’s public key?
Step-1 : Client authenticates the server
 The server tells the client its public
key at the connection time.
 During first time , SSH application
warns the client that it has never
connected to the server before .
 The client remembers the server’s
public key.
 From the second time, the client
compares the key with the stored
public key.
Step 2 : Client authenticates itself to the
server
 This can be done in 3 ways :-
 User sends his password to user
directly in the secure channel.
 This is safe as the password is
encrypted.
 Public key is placed on the server
prior to connection .
 HOST BASED AUTHENTICATION
 The server has a set of trusted
hosts.
 Client claims to be a “trusted
host” .
Installing SSH on YOUR PC
 You can download the source code
from
 http://www.openssh.com/
Configuration files
 SSH has 2 different sets of
configuration files :-
 System wide configuration files
 User specific config files
System Wide Configuration Filles
 Stored in /etc/ssh directory
 Ssh_config : client config file.
 Sshd_config : sshd server config
files.
 Sshd.pid : Server’s pid in stored
here.
User specific configuration files ..
 Stored in ~UserName/.ssh
directory.
 Known_hosts : This file contains
host keys of SSH server s accessed
by the user.
 Authorized_keys2 : holds a list of
authorized public keys for users.
 When a client connects to a server
, server authenticates client by
checking the public key stored
here.
Why config files are important :
 Specify authentication methods.
 Specify SSH protocols supported .
 Behavior of server can be
controlled by :-
 Compling time configuration
 Config file
 Command line options
Key management in SSH
 SSH authenticates users using
keypairs :-
 Private key
 Public key
Keypairs
Key management commands
 Ssh-keygen : create key pairs
 Ssh-agent : holds private key in
memory
 Ssh-add : adds key to key agent
Applications of SSH : Port Forwarding
More practical application :
 Subversion control :-
 Github
 Gitorious
 svn
PGP
Pretty Good Privacy
 PGP is a data encryption and
decryption computer program that
provides cryptographic privacy
and authentication for data
communication.
 PGP combines the best available
cryptographic algorithms to achieve
secure e-mail communication.
PGP encryption is a serial combination
of :-
 Hashing
 Data Compression
 Symmetric Key Cryptography
 Public Key Cryptography
Supports
 Message Authentication
 Integrity Checking
(checking if message was altered
since completion ).
Using PGP to create Digital Signatures
 *plaintext : information a sender wishes to transmit to a receiver
 Hash function from plaintext*
 +
 Sender’s private keys
Using PGP in emails
 Authentication
 Confidentiality
 Compression
 Email compatibility using Radix 64
conversion
Alice sends Bob an email , again !
 Ad/Ae = private/public keypair
 m = digitally signed message
 SHA-1 = hashing function
Authentication- Sending
 Alice hashes the message using
SHA-1 to obtain SHA(m).
 Alice encrypts the hash using her
private key Ad to obtain
ciphertext c given by
 c=pk.encryptAd(SHA(m))
 Alice sends Bob the pair (m,c).
Authentication - Receiving
 Bob receives (m,c) .
 Bob decrypts c using Alice's public
key Ae to obtain signature s
 s=pk.decryptAe(c)
 Bob computes hash of m to get
signature s
 If s==m ,
Authenticated !! 
Confidentiality – Added Security
 Process is repeated with session
key sk
 m=sk.decryptk(c)
 NOTE : encryption is done for
session key+public key (same
time)
E-Mail compatibility
 Modern email system can transmit
only blocks of ASCII text.
 Encrypted ciphertext blocks may
not correspond to ASCII characters
.
 This problem is overcome by …
Radix-64 conversion/base 64 encoding
 The binary input is split into blocks of 24 bits
(3 bytes).
 Each 24 block is then split into four sets each
of 6-bits.
 Each 6-bit set will then have a value between
0 and 26-1 (=63).
 This value is encoded into a printable
character.
That’s all folks
THANK YOU !! 

More Related Content

What's hot

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSHHemant Shah
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
Mehedi Farazi
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And RloginSourav Roy
 
SSH
SSHSSH
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 
Intro to SSH
Intro to SSHIntro to SSH
Intro to SSH
JP Bourget
 
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh configFLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
dmp1304
 
OpenSSH tricks
OpenSSH tricksOpenSSH tricks
OpenSSH tricks
Assem CHELLI
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
joekr1
 
Ssh
SshSsh
Sshgh02
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
Amandeep Singh
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
arunkumar sadhasivam
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
Mohammed Adam
 
Reverse shell
Reverse shellReverse shell
Reverse shell
Ilan Mindel
 
Tunneling
TunnelingTunneling
Tunneling
Ilan Mindel
 
Ports and services
Ports and servicesPorts and services
Ports and services
Ilan Mindel
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
Nate Lawson
 

What's hot (19)

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Ssh (The Secure Shell)
Ssh (The Secure Shell)Ssh (The Secure Shell)
Ssh (The Secure Shell)
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
SSH
SSHSSH
SSH
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Intro to SSH
Intro to SSHIntro to SSH
Intro to SSH
 
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh configFLOSS UK DEVOPS Spring 2015 Enhancing ssh config
FLOSS UK DEVOPS Spring 2015 Enhancing ssh config
 
OpenSSH tricks
OpenSSH tricksOpenSSH tricks
OpenSSH tricks
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Ssh
SshSsh
Ssh
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Reverse shell
Reverse shellReverse shell
Reverse shell
 
Tunneling
TunnelingTunneling
Tunneling
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 

Similar to Introduction to SSH & PGP

SSH.pdf
SSH.pdfSSH.pdf
SSH.pdf
AnisSalhi3
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21jemtallon
 
Client Server Security with Flask and iOS
Client Server Security with Flask and iOSClient Server Security with Flask and iOS
Client Server Security with Flask and iOS
Make School
 
SSL.ppt
SSL.pptSSL.ppt
SSL.ppt
TXCDHRUV
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
Information Security Awareness Group
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
Shelly119532
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
ImXaib
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
Venkatesh Iyer
 
Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network clientroot_fibo
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
sandyBS
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
ameerandsons
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
info145003
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
Nishant Pahad
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
NYversity
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
Infinity Tech Solutions
 

Similar to Introduction to SSH & PGP (20)

Lecture17
Lecture17Lecture17
Lecture17
 
SSH.pdf
SSH.pdfSSH.pdf
SSH.pdf
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
 
Client Server Security with Flask and iOS
Client Server Security with Flask and iOSClient Server Security with Flask and iOS
Client Server Security with Flask and iOS
 
SSL.ppt
SSL.pptSSL.ppt
SSL.ppt
 
Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...Introduction to distributed security concepts and public key infrastructure m...
Introduction to distributed security concepts and public key infrastructure m...
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
Security
SecuritySecurity
Security
 
Ch15
Ch15Ch15
Ch15
 
crypto2ssh
crypto2sshcrypto2ssh
crypto2ssh
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
Unit 13 network client
Unit 13 network clientUnit 13 network client
Unit 13 network client
 
unit - III.pptx
unit - III.pptxunit - III.pptx
unit - III.pptx
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
 
Course CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdfCourse CryptographyAnswer in C or C++create a program that can .pdf
Course CryptographyAnswer in C or C++create a program that can .pdf
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Network security cs9 10
Network security  cs9 10Network security  cs9 10
Network security cs9 10
 

More from Sarang Ananda Rao

Reducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial MarketsReducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial Markets
Sarang Ananda Rao
 
Partners Healthcare Case Analysis
Partners Healthcare Case AnalysisPartners Healthcare Case Analysis
Partners Healthcare Case Analysis
Sarang Ananda Rao
 
Auction analysis from Kaggle
Auction analysis from KaggleAuction analysis from Kaggle
Auction analysis from Kaggle
Sarang Ananda Rao
 
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance MeasurePersonal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
Sarang Ananda Rao
 
ACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra SecuritiesACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra Securities
Sarang Ananda Rao
 
Ticketing platform for cinemalls
Ticketing platform for cinemallsTicketing platform for cinemalls
Ticketing platform for cinemalls
Sarang Ananda Rao
 
Redundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systemsRedundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systems
Sarang Ananda Rao
 
Musicperk - Developro 2012
Musicperk - Developro 2012Musicperk - Developro 2012
Musicperk - Developro 2012
Sarang Ananda Rao
 
CMS & Chrome Extension Development
CMS & Chrome Extension DevelopmentCMS & Chrome Extension Development
CMS & Chrome Extension Development
Sarang Ananda Rao
 

More from Sarang Ananda Rao (10)

Reducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial MarketsReducing Inefficiencies in Financial Markets
Reducing Inefficiencies in Financial Markets
 
Partners Healthcare Case Analysis
Partners Healthcare Case AnalysisPartners Healthcare Case Analysis
Partners Healthcare Case Analysis
 
Auction analysis from Kaggle
Auction analysis from KaggleAuction analysis from Kaggle
Auction analysis from Kaggle
 
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance MeasurePersonal Finance: Portfolio Optimization using Jensen's Performance Measure
Personal Finance: Portfolio Optimization using Jensen's Performance Measure
 
ACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra SecuritiesACG Case Competition 2016 - Sierra Securities
ACG Case Competition 2016 - Sierra Securities
 
Ticketing platform for cinemalls
Ticketing platform for cinemallsTicketing platform for cinemalls
Ticketing platform for cinemalls
 
Redundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systemsRedundancy schemes for deduplicated cloud storage systems
Redundancy schemes for deduplicated cloud storage systems
 
Musicperk - Developro 2012
Musicperk - Developro 2012Musicperk - Developro 2012
Musicperk - Developro 2012
 
CMS & Chrome Extension Development
CMS & Chrome Extension DevelopmentCMS & Chrome Extension Development
CMS & Chrome Extension Development
 
Ui disk & terminal drivers
Ui disk & terminal driversUi disk & terminal drivers
Ui disk & terminal drivers
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Introduction to SSH & PGP

  • 2. Agenda  Dial Up & broadband connections  Introduction to SSH protocol & applications  SSH-TRANS  Client- Server Authentication  SSH configuration  Public & Private key pair generation  Digital Signatures  Use of SSH in Port Forwarding
  • 3.  SSH in subversion control  Introduction to PGP protocol & applications  Email compatibility of PGP
  • 4. A few years back ..  DIAL-UP connection
  • 5. Dial up connection  Passwords were sent over phoneline or LAN.  Was it secure ?
  • 6. The present day..  Broadband connection
  • 7. Broad band connection  Passwords go through ISPs/ untrusted networks.  How can there be a secure way of sending passwords across the internet ?
  • 8. The need for encryption  This can be solved by encrption of the data sent over the untrusted networks .  This improves the strength of the authentication mechanism people use to login.  We call this mechanism as …
  • 10.
  • 11. SSH  Replaces less secure telnet & rlogin* programs.  Uses public key cryptography to authenticate remote PCs.  *rlogin is a software utility for Unix-like computer operating systems that allows users to log in on another host via a network, communicating viaTCP port 513.
  • 12. SSH can  Execute commands & transfer files (like unix rsh & rcp commands).  Provides strong client/server authentications  Message integrity.
  • 13.
  • 14. SSH can protect against ..  Manipulation of data at intermediate elements in the network.  IP address spoofing where attack hosts pretends to be trusted host by sending packets with source address of trusted hosts  DNS spoofing.
  • 15. SSH will not protect against ..  A compromised root account .  Insecure home directories  Eg : if an attacker tries to modify files in the home directory.
  • 16. SSH version 2 protocols  SSH-TRANS , a transport layer protocol  SSH-AUTH , an authentication protocol.  SSH-CONN , a connection protocol.  SSH-AUTH & SSH-TRANS are used for remote login.
  • 17. SSH - TRANS  Provides encrypted channel between client & server machines.  Runs on top of TCP connection.
  • 18. SSH-TRANS mechanism  Client authenticates server using RSA algorithm.  After authentication , it establishes a session key to encrypt data sent over the channel.  Message integrity check is done for all data exchanged over the channel.
  • 19.  Public key is owned by the server .  How come client possesses the server’s public key?
  • 20. Step-1 : Client authenticates the server  The server tells the client its public key at the connection time.  During first time , SSH application warns the client that it has never connected to the server before .
  • 21.  The client remembers the server’s public key.  From the second time, the client compares the key with the stored public key.
  • 22. Step 2 : Client authenticates itself to the server  This can be done in 3 ways :-  User sends his password to user directly in the secure channel.  This is safe as the password is encrypted.
  • 23.  Public key is placed on the server prior to connection .  HOST BASED AUTHENTICATION  The server has a set of trusted hosts.  Client claims to be a “trusted host” .
  • 24. Installing SSH on YOUR PC  You can download the source code from  http://www.openssh.com/
  • 25. Configuration files  SSH has 2 different sets of configuration files :-  System wide configuration files  User specific config files
  • 26. System Wide Configuration Filles  Stored in /etc/ssh directory  Ssh_config : client config file.  Sshd_config : sshd server config files.  Sshd.pid : Server’s pid in stored here.
  • 27. User specific configuration files ..  Stored in ~UserName/.ssh directory.  Known_hosts : This file contains host keys of SSH server s accessed by the user.
  • 28.  Authorized_keys2 : holds a list of authorized public keys for users.  When a client connects to a server , server authenticates client by checking the public key stored here.
  • 29. Why config files are important :  Specify authentication methods.  Specify SSH protocols supported .  Behavior of server can be controlled by :-  Compling time configuration  Config file  Command line options
  • 30. Key management in SSH  SSH authenticates users using keypairs :-  Private key  Public key
  • 32.
  • 33.
  • 34.
  • 35. Key management commands  Ssh-keygen : create key pairs  Ssh-agent : holds private key in memory  Ssh-add : adds key to key agent
  • 36.
  • 37.
  • 38. Applications of SSH : Port Forwarding
  • 39. More practical application :  Subversion control :-  Github  Gitorious  svn
  • 40.
  • 42.  PGP is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication.  PGP combines the best available cryptographic algorithms to achieve secure e-mail communication.
  • 43. PGP encryption is a serial combination of :-  Hashing  Data Compression  Symmetric Key Cryptography  Public Key Cryptography
  • 44. Supports  Message Authentication  Integrity Checking (checking if message was altered since completion ).
  • 45. Using PGP to create Digital Signatures  *plaintext : information a sender wishes to transmit to a receiver  Hash function from plaintext*  +  Sender’s private keys
  • 46.
  • 47. Using PGP in emails  Authentication  Confidentiality  Compression  Email compatibility using Radix 64 conversion
  • 48. Alice sends Bob an email , again !  Ad/Ae = private/public keypair  m = digitally signed message  SHA-1 = hashing function
  • 49. Authentication- Sending  Alice hashes the message using SHA-1 to obtain SHA(m).  Alice encrypts the hash using her private key Ad to obtain ciphertext c given by  c=pk.encryptAd(SHA(m))  Alice sends Bob the pair (m,c).
  • 50. Authentication - Receiving  Bob receives (m,c) .  Bob decrypts c using Alice's public key Ae to obtain signature s  s=pk.decryptAe(c)
  • 51.  Bob computes hash of m to get signature s  If s==m , Authenticated !! 
  • 52. Confidentiality – Added Security  Process is repeated with session key sk  m=sk.decryptk(c)  NOTE : encryption is done for session key+public key (same time)
  • 53. E-Mail compatibility  Modern email system can transmit only blocks of ASCII text.  Encrypted ciphertext blocks may not correspond to ASCII characters .  This problem is overcome by …
  • 54. Radix-64 conversion/base 64 encoding  The binary input is split into blocks of 24 bits (3 bytes).  Each 24 block is then split into four sets each of 6-bits.  Each 6-bit set will then have a value between 0 and 26-1 (=63).  This value is encoded into a printable character.
  • 55.