SlideShare a Scribd company logo
4/21/2023 1
SSH – The ‘Secure’ Shell
Presented by
Karthik Sadasivam
Course: CSCI 5931 Web Security
Instructor : Dr.Yang
4/21/2023 2
Secure What.. ?
 ‘Secure shell is a de facto standard for remote logins and
encrypted file transfers.’ [SSH communications inc.]
 Founded in 1995 by Tatu Ylonen, a researcher at Helsinki
University of Technology, Finland
 It provides authentication and encryption for business critical
applications to work securely over the internet.
 Originally introduced for UNIX terminals as a replacement for the
insecure remote access “Berkeley services" , viz. rsh, rlogin, rcp,
telnet, etc.
 It can also be used for port forwarding of arbitrary TCP/IP or X11
connections (interactive terminals)
 It is a layer over TCP/IP and runs on the port 22.
4/21/2023 3
Why SSH?
 The three core security requirements for a remote access
technology – confidentiality, integrity and authentication
 Most of the earlier technologies lack confidentiality and integrity.
For e.g Telnet and FTP transmit username and passwords in
cleartext.
 They are vulnerable to attacks such as IP spoofing, DoS, MITM
and eavesdropping.
 Secure shell satisfies all the three requirements by using:
 Data Encryption to provide confidentiality
 Host-based and (or) client-based authentication
 Data integrity using MACs and hashes
4/21/2023 4
Flavors of SSH
 There are two incompatible versions of the SSH protocol: SSH-1
and SSH-2
 SSH-2 was introduced in order to fix several bugs in SSH-1 and also
includes several new features
 Both versions have technical glitches and are vulnerable to known
attacks (discussed later)
 SSH-1 is more popular nowadays due to licensing issues with
SSH-2
 OpenSSH is a free version of the SSH with open source code
development. It supports both the versions and mainly used in UNIX
environment.
4/21/2023 5
The SSH-1 protocol exchange
Client Server
Opens a TCP connection to port 22
SSH protocol version exchange
e.g ASCII :” SSH-1.5-1.2.27”
Server identification {H+S+list of ciphers and
authentication methods+cookie} + session
parameters
Selected data cipher +encrypted session
key K(H,S) +cookie
Server acknowledgement encrypted
with K
Secure connection established!
Server authenticated
H – host key ; S- Server Key ; cookie- sequence of 8 random bytes; K- session key
4/21/2023 6
The SSH-1 protocol exchange (contd.)
 Once secure connection is established, client attempts to
authenticate itself to server.
 Some of the authentication methods used are:
 Kerberos
 RHosts and RHostsRSA
 Public key
 Password based authentication (OTP)
 Integrity checking is provided by means of a weak CRC -32
 Compression is provided using the “deflate” algorithm of GNU gzip
utility. It is beneficial for file transfer utilities such as ftp, scp, etc.
4/21/2023 7
The SSH-2 protocol
 SSH-1 is monolithic, encompassing multiple functions into a single
protocol whereas SSH-2 has been separated into modules and
consists of 3 protocols:
 SSH Transport layer protocol (SSH-TRANS) : Provides the
initial connection, packet protocol, server authentication and
basic encryption and integrity services.
 SSH Authentication protocol (SSH-AUTH) : Verifies the
client’s identity at the beginning of an SSH-2 session, by three
authentication methods: Public key, host based and password.
 SSH Connection protocol (SSH-CONN) : It permits a number
of different services to exchange data through the secure
channel provided by SSH-TRANS.
 A fourth protocol SSH protocol architecture (SSH-ARCH) describes
the overall architecture.
 All the protocols are still in the draft stage.
4/21/2023 8
The SSH-2 protocol (contd.)
TCP/IP
SSH-TRANS
Binary Packet Protocol
Negotiated Encryption Protocol
Negotiated Compression Protocol
SSH-CONN
Connection Protocol
X11
TCP Port
Forwarding
SSH-USERAUTH
Authentication Protocol
Layering of SSH-2 Protocols
SSH Version
Identification
Pseudo-
Terminal
Algorithm
Negotiation
(compression,
encryption)
Key Exchange
(eg. Diffie-
Hellman)
Challenge-
Response
Pass-
word
Public-
key
Keyboard-
Interactive
Password
[Source: ‘Analysis of Secure shell vulnerability’ – white paper ]
4/21/2023 9
SSH-1 vs SSH-2
SSH-2 SSH-1
Separate transport, authentication
and connection protocols
One monolithic protocol
Strong cryptographic integrity
check
Weak CRC-32 integrity check
No server keys needed due to
Diffie Hellman Key exchange
Server key used for forward
secrecy on the session key
Supports public key certificates N/A
Algorithms used: DSA, DH, SHA-
1, MD5, 3DES, Blowfish, Twofish,
CAST-128, IDEA, ARCFOUR
RSA, MD5, CRC-32, 3DES, IDEA,
ARCFOUR, DES
Periodic replacement of session
keys
N/A
4/21/2023 10
Is SSH really secure?
 Secure shell does counter certain types of attacks such as:
 Eavesdropping
 Name service and IP spoofing
 Connection hijacking
 MITM
 Insertion attack
 However it fails against these attacks:
 Password cracking
 IP and TCP attacks
 SYN flooding
 TCP RST, bogus ICMP
 TCP desynchronization and hijacking
 Traffic analysis
 Covert channels
4/21/2023 11
Some known vulnerabilities in SSH
 OpenSSH Challenge-Response Authentication Buffer Overflow: A hostile
modification to the SSH client floods the server with authentication
responses and causes a buffer overflow. [SSH-2]
 Passive analysis of SSH traffic: It lets the attacker obtain sensitive
information by passively monitoring encrypted SSH sessions. The
information can later be used to speed up brute-force attacks on passwords,
including the initial login password and other passwords appearing in
interactive SSH sessions. [SSH-1 & SSH-2]
 Key recovery in SSH protocol 1.5 : This vulnerability may lead to the
compromise of the session key. Once the session key is determined, the
attacker can proceed to decrypt the stored session using any
implementation of the crypto algorithm used. This will reveal all information
in an unencrypted form. [SSH-1]
 CRC-32 integrity check vulnerability : It is based on the weakness of the
CRC-32 integrity that becomes exploitable due to CBC and CFB feedback
modes [SSH-1]
4/21/2023 12
Case study : The ‘GOBBLES’ exploit
 This exploits the weakness in the challenge-response authentication
mechanism of OpenSSH.
 SSH_MSG_USERAUTH_REQUEST,
SSH_MSG_USERAUTH_INFO_REQUEST ,
SSH_MSG_USERAUTH_INFO_RESPONSE
4/21/2023 13
Case study : The ‘GOBBLES’ exploit
(contd.)
 Instead of sending the requested number of responses, the client sends a large
integer
 The server allocates memory for these response strings
4/21/2023 14
Case study : The ‘GOBBLES’ exploit
(contd.)
4/21/2023 15
Case study : The ‘GOBBLES’ exploit
(contd.)
4/21/2023 16
Case study : The ‘GOBBLES’ exploit
(contd.)
4/21/2023 17
Case study : The ‘GOBBLES’ exploit
(contd.)
4/21/2023 18
SSH tools
 There are several commercial and freeware SSH tools for UNIX and
windows platforms
 Windows –
 PuTTY
 TeraTerm
 SecureCRT
 UNIX –
 The RedHat Linux package and OpenBSD come alongwith tools such as
ssh, sshd(daemon), scp(secure copy), sftp(secure ftp), etc.
 OpenSSH
4/21/2023 19
Bibiliography
[1] ‘Securing remote connections with SSH’ – a white paper by SSH
communications Security corp.
[2] Red Hat tutorials – Chapter 10 SSH :
http://www.redhat.com/docs/manuals/linux/RHL-7.3-Manual/ref-
guide/ch-ssh.html
[3] SSH tools - http://bach.dynet.com/sshtools/
[4] ’Firewalling a Secure Shell Service’ – a white paper
http://www.esat.kuleuven.ac.be/~joclaess/pub/ceci2001.pdf
[5] Cisco Security Advisory: Multiple SSH Vulnerabilities –
http://www.cisco.com/warp/public/707/SSH-multiple- pub.html
[6] SSH -The Secure Shell :The definitive guide Daniel Barrett &
Richard E. Silvermann (O’Reilly publications)
[7] ‘Analysis of a Secure Shell vulnerability’ - James M. Mike Anthis
A white paper

More Related Content

Similar to SSH.ppt

VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
cscpconf
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
Pina Parmar
 
IS - SSL
IS - SSLIS - SSL
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Sanjeev Kumar Jaiswal
 
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safeOpenSSH: keep your secrets safe
OpenSSH: keep your secrets safe
Giovanni Bechis
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
CSCJournals
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Moein
MoeinMoein
03-SSL (1).ppt
03-SSL (1).ppt03-SSL (1).ppt
03-SSL (1).ppt
ZAKARIAABED1
 
03-SSL (2).ppt
03-SSL (2).ppt03-SSL (2).ppt
03-SSL (2).ppt
ShounakDas16
 
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
ghorilemin
 
this is ppt this is ppt this is ppt this is ppt
this is ppt this is ppt this is ppt this is pptthis is ppt this is ppt this is ppt this is ppt
this is ppt this is ppt this is ppt this is ppt
ghorilemin
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
Shelly119532
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
jithu26327
 
Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2 Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2
Vishal Kumar
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
n|u - The Open Security Community
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
Hatem Mahmoud
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
Praveen Joshi
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
Emprovise
 

Similar to SSH.ppt (20)

VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safeOpenSSH: keep your secrets safe
OpenSSH: keep your secrets safe
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Moein
MoeinMoein
Moein
 
ssl
sslssl
ssl
 
03-SSL (1).ppt
03-SSL (1).ppt03-SSL (1).ppt
03-SSL (1).ppt
 
03-SSL (2).ppt
03-SSL (2).ppt03-SSL (2).ppt
03-SSL (2).ppt
 
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL (1).ppt03-SSL ...
 
this is ppt this is ppt this is ppt this is ppt
this is ppt this is ppt this is ppt this is pptthis is ppt this is ppt this is ppt this is ppt
this is ppt this is ppt this is ppt this is ppt
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2 Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Client server computing in mobile environments part 2
Client server computing in mobile environments part 2Client server computing in mobile environments part 2
Client server computing in mobile environments part 2
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 

More from Pandiya Rajan

CICD.pptx
CICD.pptxCICD.pptx
CICD.pptx
Pandiya Rajan
 
HTML-Advance.pptx
HTML-Advance.pptxHTML-Advance.pptx
HTML-Advance.pptx
Pandiya Rajan
 
css1.pptx
css1.pptxcss1.pptx
css1.pptx
Pandiya Rajan
 
HTML-Basic.pptx
HTML-Basic.pptxHTML-Basic.pptx
HTML-Basic.pptx
Pandiya Rajan
 
UNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptxUNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptx
Pandiya Rajan
 
UNIT-I Introduction to Ansible.pptx
UNIT-I Introduction to Ansible.pptxUNIT-I Introduction to Ansible.pptx
UNIT-I Introduction to Ansible.pptx
Pandiya Rajan
 
UNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptxUNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptx
Pandiya Rajan
 
page_fault pbm.ppt
page_fault pbm.pptpage_fault pbm.ppt
page_fault pbm.ppt
Pandiya Rajan
 
process syn.ppt
process syn.pptprocess syn.ppt
process syn.ppt
Pandiya Rajan
 
Selenium.pptx
Selenium.pptxSelenium.pptx
Selenium.pptx
Pandiya Rajan
 
selinuxbasicusage.pptx
selinuxbasicusage.pptxselinuxbasicusage.pptx
selinuxbasicusage.pptx
Pandiya Rajan
 
lvm.pptx
lvm.pptxlvm.pptx
lvm.pptx
Pandiya Rajan
 
environmentalpollution-.pptx
environmentalpollution-.pptxenvironmentalpollution-.pptx
environmentalpollution-.pptx
Pandiya Rajan
 
DM.pptx
DM.pptxDM.pptx
DM.pptx
Pandiya Rajan
 
thermal pollution.pptx
thermal pollution.pptxthermal pollution.pptx
thermal pollution.pptx
Pandiya Rajan
 
marinepollution.pptx
marinepollution.pptxmarinepollution.pptx
marinepollution.pptx
Pandiya Rajan
 
logical volume manager.ppt
logical volume manager.pptlogical volume manager.ppt
logical volume manager.ppt
Pandiya Rajan
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
Pandiya Rajan
 
c-c++-java-python programs.docx
c-c++-java-python programs.docxc-c++-java-python programs.docx
c-c++-java-python programs.docx
Pandiya Rajan
 
CMMI.pptx
CMMI.pptxCMMI.pptx
CMMI.pptx
Pandiya Rajan
 

More from Pandiya Rajan (20)

CICD.pptx
CICD.pptxCICD.pptx
CICD.pptx
 
HTML-Advance.pptx
HTML-Advance.pptxHTML-Advance.pptx
HTML-Advance.pptx
 
css1.pptx
css1.pptxcss1.pptx
css1.pptx
 
HTML-Basic.pptx
HTML-Basic.pptxHTML-Basic.pptx
HTML-Basic.pptx
 
UNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptxUNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptx
 
UNIT-I Introduction to Ansible.pptx
UNIT-I Introduction to Ansible.pptxUNIT-I Introduction to Ansible.pptx
UNIT-I Introduction to Ansible.pptx
 
UNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptxUNIT-I Introduction to CICD.pptx
UNIT-I Introduction to CICD.pptx
 
page_fault pbm.ppt
page_fault pbm.pptpage_fault pbm.ppt
page_fault pbm.ppt
 
process syn.ppt
process syn.pptprocess syn.ppt
process syn.ppt
 
Selenium.pptx
Selenium.pptxSelenium.pptx
Selenium.pptx
 
selinuxbasicusage.pptx
selinuxbasicusage.pptxselinuxbasicusage.pptx
selinuxbasicusage.pptx
 
lvm.pptx
lvm.pptxlvm.pptx
lvm.pptx
 
environmentalpollution-.pptx
environmentalpollution-.pptxenvironmentalpollution-.pptx
environmentalpollution-.pptx
 
DM.pptx
DM.pptxDM.pptx
DM.pptx
 
thermal pollution.pptx
thermal pollution.pptxthermal pollution.pptx
thermal pollution.pptx
 
marinepollution.pptx
marinepollution.pptxmarinepollution.pptx
marinepollution.pptx
 
logical volume manager.ppt
logical volume manager.pptlogical volume manager.ppt
logical volume manager.ppt
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
c-c++-java-python programs.docx
c-c++-java-python programs.docxc-c++-java-python programs.docx
c-c++-java-python programs.docx
 
CMMI.pptx
CMMI.pptxCMMI.pptx
CMMI.pptx
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 

SSH.ppt

  • 1. 4/21/2023 1 SSH – The ‘Secure’ Shell Presented by Karthik Sadasivam Course: CSCI 5931 Web Security Instructor : Dr.Yang
  • 2. 4/21/2023 2 Secure What.. ?  ‘Secure shell is a de facto standard for remote logins and encrypted file transfers.’ [SSH communications inc.]  Founded in 1995 by Tatu Ylonen, a researcher at Helsinki University of Technology, Finland  It provides authentication and encryption for business critical applications to work securely over the internet.  Originally introduced for UNIX terminals as a replacement for the insecure remote access “Berkeley services" , viz. rsh, rlogin, rcp, telnet, etc.  It can also be used for port forwarding of arbitrary TCP/IP or X11 connections (interactive terminals)  It is a layer over TCP/IP and runs on the port 22.
  • 3. 4/21/2023 3 Why SSH?  The three core security requirements for a remote access technology – confidentiality, integrity and authentication  Most of the earlier technologies lack confidentiality and integrity. For e.g Telnet and FTP transmit username and passwords in cleartext.  They are vulnerable to attacks such as IP spoofing, DoS, MITM and eavesdropping.  Secure shell satisfies all the three requirements by using:  Data Encryption to provide confidentiality  Host-based and (or) client-based authentication  Data integrity using MACs and hashes
  • 4. 4/21/2023 4 Flavors of SSH  There are two incompatible versions of the SSH protocol: SSH-1 and SSH-2  SSH-2 was introduced in order to fix several bugs in SSH-1 and also includes several new features  Both versions have technical glitches and are vulnerable to known attacks (discussed later)  SSH-1 is more popular nowadays due to licensing issues with SSH-2  OpenSSH is a free version of the SSH with open source code development. It supports both the versions and mainly used in UNIX environment.
  • 5. 4/21/2023 5 The SSH-1 protocol exchange Client Server Opens a TCP connection to port 22 SSH protocol version exchange e.g ASCII :” SSH-1.5-1.2.27” Server identification {H+S+list of ciphers and authentication methods+cookie} + session parameters Selected data cipher +encrypted session key K(H,S) +cookie Server acknowledgement encrypted with K Secure connection established! Server authenticated H – host key ; S- Server Key ; cookie- sequence of 8 random bytes; K- session key
  • 6. 4/21/2023 6 The SSH-1 protocol exchange (contd.)  Once secure connection is established, client attempts to authenticate itself to server.  Some of the authentication methods used are:  Kerberos  RHosts and RHostsRSA  Public key  Password based authentication (OTP)  Integrity checking is provided by means of a weak CRC -32  Compression is provided using the “deflate” algorithm of GNU gzip utility. It is beneficial for file transfer utilities such as ftp, scp, etc.
  • 7. 4/21/2023 7 The SSH-2 protocol  SSH-1 is monolithic, encompassing multiple functions into a single protocol whereas SSH-2 has been separated into modules and consists of 3 protocols:  SSH Transport layer protocol (SSH-TRANS) : Provides the initial connection, packet protocol, server authentication and basic encryption and integrity services.  SSH Authentication protocol (SSH-AUTH) : Verifies the client’s identity at the beginning of an SSH-2 session, by three authentication methods: Public key, host based and password.  SSH Connection protocol (SSH-CONN) : It permits a number of different services to exchange data through the secure channel provided by SSH-TRANS.  A fourth protocol SSH protocol architecture (SSH-ARCH) describes the overall architecture.  All the protocols are still in the draft stage.
  • 8. 4/21/2023 8 The SSH-2 protocol (contd.) TCP/IP SSH-TRANS Binary Packet Protocol Negotiated Encryption Protocol Negotiated Compression Protocol SSH-CONN Connection Protocol X11 TCP Port Forwarding SSH-USERAUTH Authentication Protocol Layering of SSH-2 Protocols SSH Version Identification Pseudo- Terminal Algorithm Negotiation (compression, encryption) Key Exchange (eg. Diffie- Hellman) Challenge- Response Pass- word Public- key Keyboard- Interactive Password [Source: ‘Analysis of Secure shell vulnerability’ – white paper ]
  • 9. 4/21/2023 9 SSH-1 vs SSH-2 SSH-2 SSH-1 Separate transport, authentication and connection protocols One monolithic protocol Strong cryptographic integrity check Weak CRC-32 integrity check No server keys needed due to Diffie Hellman Key exchange Server key used for forward secrecy on the session key Supports public key certificates N/A Algorithms used: DSA, DH, SHA- 1, MD5, 3DES, Blowfish, Twofish, CAST-128, IDEA, ARCFOUR RSA, MD5, CRC-32, 3DES, IDEA, ARCFOUR, DES Periodic replacement of session keys N/A
  • 10. 4/21/2023 10 Is SSH really secure?  Secure shell does counter certain types of attacks such as:  Eavesdropping  Name service and IP spoofing  Connection hijacking  MITM  Insertion attack  However it fails against these attacks:  Password cracking  IP and TCP attacks  SYN flooding  TCP RST, bogus ICMP  TCP desynchronization and hijacking  Traffic analysis  Covert channels
  • 11. 4/21/2023 11 Some known vulnerabilities in SSH  OpenSSH Challenge-Response Authentication Buffer Overflow: A hostile modification to the SSH client floods the server with authentication responses and causes a buffer overflow. [SSH-2]  Passive analysis of SSH traffic: It lets the attacker obtain sensitive information by passively monitoring encrypted SSH sessions. The information can later be used to speed up brute-force attacks on passwords, including the initial login password and other passwords appearing in interactive SSH sessions. [SSH-1 & SSH-2]  Key recovery in SSH protocol 1.5 : This vulnerability may lead to the compromise of the session key. Once the session key is determined, the attacker can proceed to decrypt the stored session using any implementation of the crypto algorithm used. This will reveal all information in an unencrypted form. [SSH-1]  CRC-32 integrity check vulnerability : It is based on the weakness of the CRC-32 integrity that becomes exploitable due to CBC and CFB feedback modes [SSH-1]
  • 12. 4/21/2023 12 Case study : The ‘GOBBLES’ exploit  This exploits the weakness in the challenge-response authentication mechanism of OpenSSH.  SSH_MSG_USERAUTH_REQUEST, SSH_MSG_USERAUTH_INFO_REQUEST , SSH_MSG_USERAUTH_INFO_RESPONSE
  • 13. 4/21/2023 13 Case study : The ‘GOBBLES’ exploit (contd.)  Instead of sending the requested number of responses, the client sends a large integer  The server allocates memory for these response strings
  • 14. 4/21/2023 14 Case study : The ‘GOBBLES’ exploit (contd.)
  • 15. 4/21/2023 15 Case study : The ‘GOBBLES’ exploit (contd.)
  • 16. 4/21/2023 16 Case study : The ‘GOBBLES’ exploit (contd.)
  • 17. 4/21/2023 17 Case study : The ‘GOBBLES’ exploit (contd.)
  • 18. 4/21/2023 18 SSH tools  There are several commercial and freeware SSH tools for UNIX and windows platforms  Windows –  PuTTY  TeraTerm  SecureCRT  UNIX –  The RedHat Linux package and OpenBSD come alongwith tools such as ssh, sshd(daemon), scp(secure copy), sftp(secure ftp), etc.  OpenSSH
  • 19. 4/21/2023 19 Bibiliography [1] ‘Securing remote connections with SSH’ – a white paper by SSH communications Security corp. [2] Red Hat tutorials – Chapter 10 SSH : http://www.redhat.com/docs/manuals/linux/RHL-7.3-Manual/ref- guide/ch-ssh.html [3] SSH tools - http://bach.dynet.com/sshtools/ [4] ’Firewalling a Secure Shell Service’ – a white paper http://www.esat.kuleuven.ac.be/~joclaess/pub/ceci2001.pdf [5] Cisco Security Advisory: Multiple SSH Vulnerabilities – http://www.cisco.com/warp/public/707/SSH-multiple- pub.html [6] SSH -The Secure Shell :The definitive guide Daniel Barrett & Richard E. Silvermann (O’Reilly publications) [7] ‘Analysis of a Secure Shell vulnerability’ - James M. Mike Anthis A white paper