The Risks of Using SSH
نویسنده
چکیده
Executive Summary This paper deals with security issues surrounding the use of Secure Shell (SSH). SSH is a replacement for telnet, rlogin, ftp, rsh, rcp, rdist, and other r*-based programs. It offers a secure communication channel between computers on an insecure network. Authenticity, confidentiality, and integrity are provided. Despite these features, SSH has several weaknesses that render it insecure under certain conditions. This paper examines these circumstances and weaknesses, proposes solutions, and suggests conditions which lead to effective use of SSH. The existence of insecure access methods bypasses the security offered by SSH. Public host keys might not undergo authentication, leading to a risk in man-in-the-middle attacks. The potential dependency on NFS (Sun Microsystems' Network File System) leads to the lack of confidentiality, integrity, and authenticity in the access control files. The tunnelling capability of SSH poses a risk to firewalls. In general, SSH will not provide security under any of the following situations: (1) dumb-terminals or X-terminals are used; (2) NFS is used; (3) public host keys cannot be certified as authentic. Users should not use SSH and should not revert to insecure remote access methods under the following conditions: (1) the public key of the remote host cannot be proven authentic; (2) the local or remote host uses NFS; (3) there exists an insecure segment along the communication path; (4) the local or remote host is not trusted.
منابع مشابه
Timing Analysis of Keystrokes and Timing Attacks on SSH
SSH is designed to provide a secure channel between two hosts. Despite the encryption and authentication mechanisms it uses, SSH has two weakness: First, the transmitted packets are padded only to an eight-byte boundary (if a block cipher is in use), which reveals the approximate size of the original data. Second, in interactive mode, every individual keystroke that a user types is sent to the ...
متن کاملA Study of Passwords and Methods Used in Brute-Force SSH Attacks
In its Top-20 Security Risks report for 2007, the SANS Institute called brute-force password guessing attacks against SSH, FTP and telnet servers “the most common form of attack to compromise servers facing the Internet.” A recent study also suggests that Linux systems may play an important role in the command and control networks for botnets. Defending against brute-force SSH attacks may there...
متن کاملWebDAV based Open Source Collaborative Development Environment
Open source projects are characterized by their distributed developers, openness, and use of a community-based development process. Successful open source projects such as Apache, Linux, and PHP have a web-based Collaborative Development Environment (CDE) that provides source code repository access, knowledge management, discussion lists, bug tracking, and user support. Distributed software dev...
متن کاملProposal and Implementation of SSH Client System Using Ajax
Technology called Ajax gives web applications the functionality and operability of desktop applications. In this study, we propose and implement a Secure Shell (SSH) client system using Ajax, independent of the OS or Java execution environment. In this system, SSH packets are generated on a web browser by using JavaScript and a web server works as a proxy in communication with an SSH server to ...
متن کاملArchitectural Defects of the Secure Shell
Although some flaws have been found out in the SSH, the Secure Shell, there is not so much discussion about its architecture or design safety. Therefore, in this paper, considering the SSH’s architecture, e.g. the key exchange protocol, the user authentication protocols and its total design of the SSH, we not only discuss the SSH’s architectural safety but show some critical flaws for SSH users...
متن کامل