Overview Of Ssh

Overview Of Ssh

You can configure SSH connections when you need secure, encrypted communications between a trusted host and your PC over an insecure network.

Overview of SSH and Requirements SSH is a UNIX-based command suite and protocol for securely accessing a remote computer. SSH secures network client/server communications by authenticating both endpoints with a digital certificate and by encrypting passwords. SSH uses RSA public key cryptography to manage connections and authentication. SSH is more secure than telnet and other shell based communication methods, and is used to manage web servers and other remote servers. Unlike the other connection types, when an SSH connection is set up between two Sun N1 Service Provisioning System 6.0 applications, the downstream application does not need to be manually started.

Overview Of Shinto

Overview Of Ssh

The upstream application automatically starts the downstream application when it is needed. The downstream application remains running for the duration necessary and shuts down automatically when it is not used for a configurable period of time. Do not manually start the downstream application for an SSH connection. For example, if you set up a Local Distributor to connect to an Remote Agent using SSH, do not manually start the Remote Agent. The Local Distributor automatically starts the Remote Agent when necessary. The Remote Agent continues to run for as long as it is being used.

The Local Distributor will automatically shut down the Remote Agent when it has not been used for a configurable period of time. Ssh-agent or Empty Password Keys You can configure SSH to use the ssh-agent or to use empty password keys. If you use empty password keys, the generated SSH private key is stored with an empty password.

As a result, you do not need a password to access the key. When you use SSH to communicate with another machine that trusts its public key, you are not prompted for a password. When using the ssh-agent, the generated private key is stored with a secure password and saved on secure media. You communicate with another machine by starting the ssh-agent, uploading the private key from the secure media, and supplying the password. The private key is not stored on the file system, but is stored in the memory of the ssh-agent process. Empty Password Keys If you use empty password keys, the generated SSH private key is stored with an empty password. As a result, you do not need a password to access the key.

When you use SSH to communicate with another machine that trusts its public key, you are not prompted for a password. ssh-agent When using the ssh-agent, the private key is stored with the ssh-agent that is running only on the Master Server. The public key is distributed to other machines on the network.

When an SSH application requires authentication, it communicates with the ssh-agent to authenticate. You must turn on ssh-agent forwarding when making intermediate SSH connections to enable Local Distributors to proxy to the ssh-agent that is running on the Master Server for authentication. Ssh-agent forwarding allows Local Distributors to authenticate to Local Distributors and Remote Agents that are downstream. This approach provides more security. Also, configuring the ssh-agent for use with the Sun N1 Service Provisioning System 6.0 is less complicated than configuring empty passwords. When using empty passwords, the private key is stored on the file system of the machine without a password. Also, the private key must be present on all machines that initiate SSH communications.

In the case of the Sun N1 Service Provisioning System 6.0, all Master Servers and Local Distributors that are connecting to applications downstream using SSH are required to have a private key. This approach provides less security. SSH Requirements The Sun N1 Service Provisioning System 6.0 requires the following SSH capabilities:. Remote command invocation through ssh.

Public-private key authentication. Support for BatchMode yes interaction, which is the ability to invoke the ssh command without interaction from an operator If you are using the ssh-agent, the following SSH capabilities are required:. Support for ssh-agent.

Support for ssh-agent forwarding in SSH. Use the -A option in Open SSH. The following capabilities are helpful when configuring machines for SSH connectivity, but are not requirements:. Force allocate a tty when doing remote command invocation.

Use the -t option in OpenSSH. Kill the ssh agent. Use the -k option for the ssh-agent command in OpenSSH. Generate an RSA key for higher security. Use the -t rsa in OpenSSH.

Overview Of Ssh

Review the following checklist to determine whether an implementation of SSH meets the requirements of the Sun N1 Service Provisioning System 6.0. The ssh-keygen command must generate a public-private key pair that can be used for authenticating SSH invocations.

Comments are closed.