Telnet: Discuss Telnet in Detail
Telnet: Discuss Telnet in Detail
$ ftp voyager.deanza.tbda.edu
Connected to voyager.deanza.tbda.edu.
220 (vsFTPd 1.2.1)
530 Please login with USER and PASS.
Name (voyager.deanza.tbda.edu:forouzan): forouzan 331 Please
specify the password.
Password:
230 Login successful.
ftp> Is reports
150 Here comes the directory listing.
drwxr-xr-x 23027 411 4096 Sep 24 2002 business 411 4096
drwxr-xr-x 23027 Sep 24 2002 personal
drwxr-xr-x 23027 411 4096 Sep 24 2002 school
226 Directory send OK.
SECURITY
SSH(Secure Shell)
Write short notes on SSH.
• Secure Shell protocol (SSH) provides a remote login service in a
secure manner
• SSH uses well-known port 22.
• SSH is used to provide strong client/server authentication
– Passwords are not sent as clear text over the network. It is sent in
encrypted form.
– Thus sending password through un-trusted network is not a problem.
• Unlike Telnet and rlogin, SSH supports message integrity and
confidentiality.
• SSH version 2 consist of the following protocols
1.Transport layer protocol SSH-TRANS
2. Authentication protocol SSH-AUTH
3. Connection protocol SSH-CONN
1.SSH-TRANS
• SSH-TRANS provides an encrypted channel for
communication. It runs on top of a TCP connection.
• Client and server establish secure channel by first
having the client authenticate the server using RSA.
o Server informs the client of its public key at the time of
connection
o Client warns the user when it tries to connect to the
server for the first time, since it does not know the
server
• Once authenticated, the client and server
establish a session key that they will use to
encrypt any data sent over the channel.
• o Client remembers the server's public key
• o For future connection, the client compares
server's response with the saved key.
• SSH-TRANS includes a negotiation of the
encryption algorithm the two sides are going to
use. For example, AES is commonly selected.
SSH-TRANS include a message integrity check of
all data exchanged over the channel.
2. SSH-AUTH
1. Server is authenticated during setup of SSH-TRANS channel by default
2. User can authenticate using any of the three mechanism
1) Login with username and password. Password is sent in encrypted
form
2) Public key encryption by asking the user to store user's public key on
the server
3) Host based authentication requires the client to be authenticated
when it connects to server for the first time. Further connection from
a trusted host is believed to be from the same user.
3. In UNIX,
o /.ssh/known_hosts records the keys for all the hosts the user has logged
into
o /.ssh/authorized_keys contains the public keys needed to authenticate the
user when he or she logs into this machine
o /.ssh/identity contains the private keys for authenticating user on remote
machine
3.SSH-CONN
1. SSH can be extended to support insecure TCP applications
such as X Windows, IMAP mail readers, etc using SSH-
CONN.
2. Insecure applications are run by tunneling through SSH,
known as port forwarding.
o Client on host A communicates with server on host B using
SSH.
o Client data sent through SSH is encrypted at sender side
o The receiving SSH at well-known port decrypts the contents
o Content is forwarded to the actual port on which the server
is listening