Flexible and Scalable Public Key Security for SSH
نویسندگان
چکیده
A standard tool for secure remote access, the SSH protocol uses publickey cryptography to establish an encrypted and integrity-protected channel with a remote server. However, widely-deployed implementations of the protocol are vulnerable to man-in-the-middle attacks, where an adversary substitutes her public key for the server’s. This danger particularly threatens a traveling user Bob borrowing a client machine. Imposing a traditional X.509 PKI on all SSH servers and clients is neither flexible nor scalable nor (in the foreseeable future) practical. Requiring extensive work or an SSL server at Bob’s site is also not practical for many users. This paper presents our experiences designing and implementing an alternative scheme that solves the public-key security problem in SSH without requiring such an a priori universal trust structure or extensive sysadmin work—although it does require a modified SSH client. (The code is available for public download.)
منابع مشابه
Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)
The Secure Shell (SSH) protocol requires all implementations to support public key authentication method (“publickey”) for authentication purposes [2]. Hypertext Transfer Protocol (HTTP) applications which provide a SSH client over the web browser need to support “publickey”. However, restrictions in HTTP, such as Same Origin Policy, make it difficult to perform such authentications. In this do...
متن کاملGeneric Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract The Secure Shell protocol (SSH) ...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملThe Risks of Using SSH
Executive Summary This paper deals with security issues surrounding the use of Secure Shell (SSH). SSH is a replacement for telnet, rlogin, ftp, rsh, rcp, rdist, and other r*-based programs. It offers a secure communication channel between computers on an insecure network. Authenticity, confidentiality, and integrity are provided. Despite these features, SSH has several weaknesses that render i...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل