An Overview to SSH : Secure Shell
Total Page:16
File Type:pdf, Size:1020Kb
© 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138) An Overview to SSH : Secure Shell Deepak Chahal1, Abhijaat Bhatnagar2, Jasmeet Singh3 Professor1, Jagan Institute of Management Studies, Sector-5, Rohini Student Scholar (MCA)2,3, Jagan Institute of Management Studies, Sector-5, Rohini different types of communication between local machine and remote host that mainly secure remote ABSTRACT accessibility to material and remote commands. Secure Shell(SSH) is basically a cryptographic This technology also used to build secure tunnels for protocol or an interface that can implement network other application protocols like Window System service and communication with the need of remote graphical session. The way an individual communicate computer. It authorize users to conduct network with this technology is just like a normal person talk. communication and other utility on unsecured Users of this technology along with Telnet can interact network. with themselves, can have meaningful conversations SSH was firstly planned to toil on a client/server with the machine and SSH may also plan more often architecture and client securely authenticate and sends on public key pairs to authenticate hosts to one encrypted data to be implemented on to the server. another. SSH mostly uses AES, IDEA and BLOWFISH. This technology include one session that specifies two Keywords: Secure Shell, Protocol, Encryption, public keys such as one public key for the Communication, Telnet authentication of the remote system to the local system and other key for the authentication of the local system INTRODUCTION to the remote system. By default SSH also concentrate on the standard Transmission Control Protocol (TCP) port 22. It also provides well-built authentication and encrypted data communication between two or more connecting devices on an open network like as the Internet. Secure shell may extensively access by network administrator for managing system and applications remotely, and it also permits them to log into other system over a network and implements commands and moves the files or data from one system to another. SSH also works on delivery of software products, its updates and other administrative or management things[1]. Figure 1: SSH Client and SSH Server There is a SSH port technique that will help in redirecting the network traffic to a particular port/IP address. In this technique the remote host is mainly One of the most attractive and efficient feature of this accessible by the applications of the local host. SSH technology is that it basically implements to secure the IJRAR19K2403 International Journal of Research and Analytical Reviews (IJRAR)www.ijrar.org 759 © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138) tunnels are very useful software for the IT 2. Asymmetric Encryption administrator. Apart from other encryption this method basically uses ORIGIN two separate key for encryption and decryption and these keys also called as public and private keys. Few years ago, message or data transfer is not possible and said to give unreliable result. But with the advent Public key is the openly distributed and shared in all of time, day by day technology increases with the the devices or systems and more closely connected increase of human demand. with the private key with respect to its functionality whereas private key in not shared with the device and Previously, this message transfer is not possible and is its connection is secured and robust in the system. not able to provide correct result. But with the time corrections are made to make it reliable way of 3 Hashing communication with the devices. Hashing is a part and parcel form of the cryptography One of the great researcher Tatu Ylönen of Helsinki which is basically implemented in the secure shell University of Finland planned the initial version of connectivity[2]. There is no need of private and public protocol which is called as SSH:1 in ayear 1995. The keysin this part of hashing. There is one way hash main goal of SSH was to replace the untimely rlogin, functions which is different from other forms of TELNET,FTP and rsh protocols, which did not deliver encryption as they are not suitable for the decryption robust validation nor assurance confidentiality. Ylönen part of the massage from one system to another. released his implementation as Freeware in July 1995. Hashing mainly build a unique value of affixed length in each input that shows the no clear trend that can be Ylönen founded the SSH communication Security to destroyed. market and he developed SSH in December 1995. The Moreover it is not possible to build or generate the main version of the SSH communication uses input from the hash function as the client holds the different parts of software like GNU libgmp, and later correct input and checks whether they are accessing varieties released by the SSH progressed into increase the correct value or not[3]. software. Secure shell access hash function to check the There are various categories or the versions used in authentication of the data or the message and it is SSH communications: basically done by the help of HMAC’s. Version 1.x FUNCTIONS Version 2.x It mainly secure the remote access towards Version 1.99 SSH that enables the network systems and for Open SSH the users as well as for the automated process. OSSH It also provide the interactive file or data APPLICATION transfer sessions. It mainly focus on issuance of commands on 1. Symmetrical Encryption the remote systems. It is a structure of encryption where a classified key is It is also secure in management of the used for encryption and decryption of a data network system components. communication by the client and the server. Practically anyone controlling the key can decrypt the massage being transferred. In symmetrical encryption WORKING one or more keys are used to pass the data from one It is used to replace insecure terminal or login system to another and moreover the client and the program like FTP (file transfer protocol), server expand the keys using agreed method. Telnet (Telecommunication network), rLogin (remote login), rsh (remote shell) etc. It help to enable different functions like session terminal on remote systems. IJRAR19K2403 International Journal of Research and Analytical Reviews (IJRAR)www.ijrar.org 760 © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138) It replace file transfer programs like FTP (file transfer protocol), RCP (remote copy) etc. By default, this protocol is commonly Secure Shell is basically used for connecting to accessible in Operating System like Unix. a remote host for session of terminal. Commonly used command is:- One of the Open Source Implementation of [email protected] Secure Shell is called as Putty. It was basically developed to run on Windows platform. It was This command will help to connect client and mostly used by Windows for longer period of server time. Now-a-Days, it is currently available for Windows, Unix, BSD, Mac OS[5]. If the connection is building for the first time in The Secure Shell Protocol is mainly composed between local host and server then the user is of three elements and they are sLogin, SSH and provided with the remote host’s public key SCP. And earlier for Unix it is composed of 3 fingerprint and with the help of this key user is elements and they are rLogin, RSH and RCP. capable to make connection otherwise no This protocol authenticate the remote computer connection can be made. by using Public-Key Cryptography and also allow to authenticate the user, if necessary. The authenticity of the host can only be maintained with the help of the DSA key Now there are lots of Secure Shell Protocol fingerprint. available for different platforms provided with The DSA key fingerprint will be like:- open source and proprietary licenses. ab:cd:ef:01:23:45:67:89:98:76:54:32:10:fe:dc:b a. It involve graphical implementation. Their programs are run as CLA (Command Line It will ask the user whether they want to Argument) or are executed as a script part in continue (yes/no)? the program. If yes then it will retain the created session in between client and server and this DSA key is Execution of the ssh command with no stored in the user’s local system called as host parameter or argument like user ID, destination file. It is a hidden file which is by default host will return a list of Secure Shell command stored in hidden directory. This hidden parameters and options[6]. directory is called as /.ssh/known hosts in user’s home directory. The commonly used SSH command to run the program and the destination host IP address or Once the key has been stored in the user’s host the destination host name are:- file, the client will automatically connect to the server without any approvals and this key will o ssh server.example.org help to authenticate the connection between o ssh [email protected] client and server. o ssh example.org ls o sshd Secure shell is an open source protocol which o ssh-keygen can be implemented in different platforms. And o ssh-copy-id this open source protocol is most commonly o ssh-agent found in platforms like Unix, Linux, BSD o ssh (Berkeley Software Distribution), Mac o scp Operating System (provided by Apple)[4]. o sftp This protocol is also used in Windows platform. It was firstly run in 2015 on Windows Power Shell.