written by ssh Nikkei Linux

Similar documents
SSH SECURITY. If you ve never used SSH before on a computer, the chances are very high that

SSH. Partly a tool, partly an application Features:

This is a guide about using Putty on Windows with OpenSSH on Linux. You would learn about how to:

Some SSH tips & tricks you may enjoy (plus, iptables)

ssh and handson Matsuzaki maz Yoshinobu 1

Secure SHell Explained!

MVAPICH MPI and Open MPI

Configuring Users and Common Roles

Defending Yourself Against The Wily Wireless Hacker

The Unix Shell. The Secure Shell

Linux Network Administration

BR*Tools Studio 7.10 for Oracle Multi-instance Server Standalone Part 2: Server, Database Instances and their Users

Using keys with SSH Rob Judd

SSH and keys. Network Startup Resource Center

Security with SSH. Network Startup Resource Center

Managing terminal sessions with screen. R. Bader (LRZ) G. Hager (RRZE) V. Weinberg (LRZ)

CSE 265: System and Network Administration

Parallelizing data processing on cluster nodes with the Distributor

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the all nodes.

SSH Tips and Tricks. Ferry Boender. Warning

Tutorial: SSH. Secure SHell: Connect remotely anything, anywhere. UL High Performance Computing (HPC) Team Sebastien Varrette

Emergency shell commands 1

Configure HOSTNAME by adding the hostname to the file /etc/sysconfig/network. Do the same to all the other 3(4) nodes.

LINUX ADMINISTRATION TYBSC-IT SEM V

netcat Johannes Franken

SSH. What is Safely 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

What is Secure. Authenticated I know who I am talking to. Our communication is Encrypted

An Overview of SSH. Presentation to Linux Users of Victoria. Melbourne, August 26, 2017

Expedition. Hardening Guide Version Palo Alto Networks, Inc.

John the Ripper on a Ubuntu MPI Cluster

Analyse your attacker s vectors with an SSH Honey Pot

Create Test Environment

2-1-1 ssh Secure SHell

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

TELE301 Lab16 - The Secure Shell

Project #6: Using ssh, scp and sftp with Key-Based Authentication

No More Passwords (with SSH)

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Cryptography - SSH. Network Security Workshop May 2017 Phnom Penh, Cambodia

KB How to upload large files to a JTAC Case

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cryptography - SSH. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Configuring SSH Public Key Authentication

Security with SSH. SANOG VI IP Services Workshop. Hervey Allen

Topics. Security with SSH. Cryptographic Methods and Apps. SSH Application Layer Security

Network Operations Management

Using RDP with Azure Linux Virtual Machines

CPSC 467: Cryptography and Computer Security

2-1-1 ssh Secure SHell

Using RANCID. Contents. 1 Introduction Goals Notes Install rancid Add alias Configure rancid...

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

Computer Networks Prof. Ashok K. Agrawala

UL HPC School 2017[bis] PS1: Getting Started on the UL HPC platform

CPSC 467b: Cryptography and Computer Security

NETW 110 Lab 3 Post-Installation Configuration Page 1

Mango AM335x (AM335X) Gbit. Lan 이용복사테스트. Crazy Embedded Laboratory

Oracle Enterprise Manager. Description. Versions Supported. Prerequisites

(mis)trusting and (ab)using SSH

ssh keys, yum, ntp, rsync

Introduction to the ITA computer system

14. Configuring Telnet in Knoppix

CS451 - Assignment 8 Faster Naive Bayes? Say it ain t so...

The Unix Shell & Shell Scripts

15-122: Principles of Imperative Computation

Linux Systems Security. Access Control and Authentication NETS1028 Fall 2016

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Package ssh. June 4, 2018

IT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1

Homework #7 Amazon Elastic Compute Cloud Web Services

Linux Networking: network services

PROJECT INFRASTRUCTURE AND BASH INTRODUCTION MARKUS PILMAN<

CSMC 412. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 2. September 15 CMSC417 Set 2 1

2018/10/17 20:02 1/5 3 Zabbix Agent (UNIX, Standalone daemon)

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

Supercomputing environment TMA4280 Introduction to Supercomputing

Virtual Terminal Apps telnet/rlogin

Configuring IDS TCP Reset Using VMS IDS MC

Using WestGrid from the desktop Oct on Access Grid

Parameter searches and the batch system

Using a Linux System 6

CS615 - Aspects of System Administration. Multiuser Fundamentals

Fundamentals of Linux Platform Security

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Lab - Examining Telnet and SSH in Wireshark

Running Programs in UNIX 1 / 30

fuser - Linux Command

Network security session 9-2 Router Security. Network II

News Leafsite mini HOWTO

MsActivator (VSOC 8.2) Administration Guide

Remote Access to Unix Machines

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

TCP Wrapper. Provides host-based access control to network services

Sourceforge.net CVS ~ Compile Farm

CS321: Computer Networks FTP, TELNET, SSH

Send document comments to

Intro to Git. Getting started with Version Control. Murray Anderegg February 9, 2018

Linux Training. for New Users of Cluster. Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala

ECE 650 Systems Programming & Engineering. Spring 2018

Management Access. Configure Management Remote Access. Configure ASA Access for ASDM, Telnet, or SSH

Transcription:

written by ssh Nikkei Linux 2000.12 149

shell stream tcp nowait root /usr/sbin/tcpd in.rshd login stream tcp nowait root /usr/sbin/tcpd in.rlogind # ssh if [ -x /usr/sbin/sshd ] then /usr/sbin/sshd fi 150 Nikkei Linux 2000.12

ssh Nikkei Linux 2000.12 151

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. Please contact your system administrator. Add correct host key in /home/sengoku/.ssh/known_hosts to get rid of this message. RSA host key for azabu.klab.org has changed and you have requested strict checking. The authenticity of host 'azabu.klab.org' can't be established. RSA key fingerprint is 9e:f3:1d:35:67:ad:74:54:35:8a:7b:9a:46:dc:c4:c7. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'azabu.klab.org' (RSA) to the list of known hosts. x x xc xc xs x x 152 Nikkei Linux 2000.12

ssh-keygen asao:/home/sengoku % ssh-keygen Generating RSA keys:...ooooooo...ooooooo Key generation complete. Enter file in which to save the key (/home/sengoku/.ssh/identity): Created directory '/home/sengoku/.ssh'. Enter passphrase (empty for no passphrase): this is a sample passphrase Enter same passphrase again: this is a sample passphrase Your identification has been saved in /home/sengoku/.ssh/identity. Your public key has been saved in /home/sengoku/.ssh/identity.pub. The key fingerprint is: 2e:9b:b8:2e:0e:6a:a3:d9:b1:cf:77:14:63:73:0b:e4 sengoku@asao.gcd.org Nikkei Linux 2000.12 153

154 Nikkei Linux 2000.12

ssh-agent asao:/home/sengoku % ssh azabu.klab.org Enter passphrase for RSA key 'sengoku@asao.gcd.org': this is a sample passphrase Last login: Mon Oct 9 15:35:15 2000 from asao.gcd.org azabu:/home/sengoku % asao:/home/sengoku % scp.cshrc azabu:/tmp/. Enter passphrase for RSA key 'sengoku@asao.gcd.org': this is a sample passphrase.cshrc 1 KB 1.8 kb/s ETA: 00:00:00 100% asao:/home/sengoku % ssh-agent setenv SSH_AUTH_SOCK /tmp/ssh-jomuz377/agent.377; setenv SSH_AGENT_PID 378; echo Agent pid 378; asao:/home/sengoku % setenv SSH_AUTH_SOCK /tmp/ssh-jomuz377/agent.377 asao:/home/sengoku % setenv SSH_AGENT_PID 378 Nikkei Linux 2000.12 155

asao:/home/sengoku % eval `ssh-agent` Agent pid 378 asao:/home/sengoku % ssh azabu.klab.org hostname azabu.klab.org RhostsAuthentication no RhostsRSAAuthentication no PasswordAuthentication no PermitEmptyPasswords no Compression Host azabu HostName yes azabu.klab.org Host asao HostName ube.gcd.org Port 443 ProxyCommand /home/sengoku/bin/proxy-klab %h %p RSAAuthentication asao:/home/sengoku % ssh-add Need passphrase for /home/sengoku/.ssh/identity Enter passphrase for sengoku@asao.gcd.org: this is a sample passphrase Identity added: /home/sengoku/.ssh/identity (sengoku@asao.gcd.org) yes 156 Nikkei Linux 2000.12

ssh kamiya:/home/sengoku % telnet proxy.klab.org 8080 Trying 10.10.0.3... Connected to proxy.klab.org. Escape character is '^]'. CONNECT ube.gcd.org:443 HTTP/1.0 HTTP/1.0 200 Connection established SSH-1.99-OpenSSH_2.2.0p1 Nikkei Linux 2000.12 157

#! /usr/bin/perl $PROXY_KLAB = "proxy.klab.org"; $PROXY_KLAB_PORT = 8080; $Verbose = 0; while ($_ = shift) { last if! /^-(.*)/; if ($1 =~ /^v+$/) { $Verbose += length($&); next; print<<eof; Usage: proxy [option...] <host> <port> Options: -v Verbose mode EOF $HOST = $_; if ($_ = shift) { $PORT = $_; else { $PORT = 23; print "Verbose Level: $Verbose\n" if $Verbose; use Socket; ($name, $aliases, $proto) = getprotobyname('tcp'); ($name, $aliases, $type, $len, $thataddr) = gethostbyname($proxy_klab); $that = sockaddr_in($proxy_klab_port, $thataddr); socket(s, PF_INET, SOCK_STREAM, $proto) die "socket: $!"; connect(s, $that) die "connect: $!"; if ($Verbose > 1) { $Rin = &fhbits('stdin S'); else { $Rin = &fhbits('s'); &login; &connect; exit 0; # login sub login { &receive(0.1); &send("connect $HOST:$PORT HTTP/1.0\r\n\r\n"); do { &receive(0.1); until (/HTTP\/[\d\.]+ 200.*\n\n/); $Raw =~ m/http\/[\d\.]+ 200.*[\r\n]+/; $Raw = $'; # connect sub connect { local($rout); print "CONNECT\n" if $Verbose; $Rin = &fhbits('stdin S'); syswrite(stdout,$raw,length($raw)); while ((select($rout=$rin,undef,undef,undef))[0]) { if (vec($rout,fileno(s),1)) { return if sysread(s,$_,1024) <= 0; # EOF syswrite(stdout,$_,length); if (vec($rout,fileno(stdin),1)) { return if sysread(stdin,$_,1024) <= 0; # EOF syswrite(s,$_,length); # send(str); # str sub send { undef $Buffer; undef $Raw; while( $_ = shift ) { print if $Verbose > 2; syswrite(s,$_,length); # receive(s); # s sub receive { local($timeout) = shift; local($rout); while ((select($rout=$rin,undef,undef,$timeout))[0]) { if (vec($rout,fileno(s),1)) { &abort if sysread(s,$_,1024) <= 0; # EOF $Raw.= $_; tr/\r\000\012\021\023\032/\n/d; $Buffer.= $_; print if $Verbose > 1; if (vec($rout,fileno(stdin),1)) { &abort if sysread(stdin,$_,1024) <= 0; # EOF s/\n/\r/g; syswrite(s,$_,length); $_ = $Buffer; sub fhbits { local(@fhlist) = split(' ',$_[0]); local($bits); for (@fhlist) { vec($bits,fileno($_),1) = 1; $bits; sub abort { exit(1); 158 Nikkei Linux 2000.12