User`s guide

Configuring Secure Shell (SSH) Server
3-8 Using the CLI
Configuring Secure Shell (SSH) Server
Understanding the SSHv2 Protocol
SecureShell(SSH)isa“secure”replacementforTelnet.WhenusingTelnet,allcommunications,
includingpasswords,aresentacrossthenetworkincleartext(tha tis,unencrypted),making
eavesdroppingoncommunicationsaneasytaskforaknowledgeableuserwithaccesstothe
network.SSHprovidesthesameremoteaccessto
theMatrixDFESeriesorNSAdevicethat
Telnetprovides,butdoessosecurelybyencryptingallsessiondata,includingpasswords.SSH
alsoprovidesthefollowingadditionalsecurityfeatures:
Publickeyauthenticationoftheserver.Thisfeatureenablestheclienttovalidatetheservers
authenticity,makingitdifficultfor
anattackertomasqueradeastheserver.
Digitallysigning
allpackets.Thisfeatureusescryptographicallystrongmessagedigeststo
authenticateallcommunications,preventinganattackerfromsuccessfullyinterceptingand
alteringinformation.
SSHserverisdisabledontheMatrixDFESeriesandNSAdevicesbydefault.InordertorunSSH
initsdefaultconfiguration,youmustcompletethefollowing
stepsdescribedinthissection.
•Generatehostkeys
•EnableSSHserver
About Host Keys
SSHserverauthenticatesitselftotheclientthroughahostkey.Hostkeysareasymmetric
encryptionkeyscommonlyusedinwhatisknownaspublickeycryptography.SSHserveruses
uniquehostkeys,eachconsistingofapairofkeys,generatedsimultaneously.Althoughthe
generatedkeysarerelated,onecannotbe
derivedfromtheother.Thefirstkeyofthegenerated
pair,thepublickey,canbepublishedfreelyandisusedbySSHclients tosecurelyidentifythe
SSHserver.Thesecondkeyofthegeneratedpair,thesecretkey,isstoredinasafeplaceand
shouldneverbe
divulged.ThiskeyisusedbytheSSHservertosecurelyidentifyitselftoSSH
clients.
TheSSH2protocolmakestwodistincttypesofhostkeysavailable:theDigitalSignature
Algorithm(DSA)andtheRivestShamirAdleman(RSA)algorithm.BothDSAandRSAareNIST
approveddigitalsignaturealgorithms.
Afterverifying
serverauthenticity,theSSHclientgeneratesakeytouseuntilitdisconnectsfrom
theserver.Oncetheclientandserverhavecopiesofthekey,theywilluseittoencryptallfurther
communications.Inadditiontoencryptingeachpacket, boththeclientandserverwillstam p each
outgoing
packetwithdatathatcanbeusedtovalidatethecontentsofthepackets.Thisstamp
consistsofamessageauthenticationcode(MAC)createdbyusingasecuremessagedigest
algorithmsuchasSHA1orMD5.Ifthecontentofthepacketchangesenroute,MAC
authenticationwillfail.