User`s guide
Configuring Secure Shell (SSH) Server
3-8 Using the CLI
Configuring Secure Shell (SSH) Server
Understanding the SSHv2 Protocol
SecureShell(SSH)isa“secure”replacementforTelnet.WhenusingTelnet,allcommunications,
includingpasswords,aresentacrossthenetworkincleartext(tha tis,un‐encrypted),making
eavesdroppingoncommunicationsaneasytaskforaknowledgeableuserwithaccesstothe
network.SSHprovidesthesameremoteaccessto
theMatrixDFESeriesorN‐SAdevicethat
Telnetprovides,butdoessosecurelybyencryptingallsessiondata,includingpasswords.SSH
alsoprovidesthefollowingadditionalsecurityfeatures:
• Public‐keyauthenticationoftheserver.Thisfeatureenablestheclienttovalidatetheserver’s
authenticity,makingitdifficultfor
anattackertomasqueradeastheserver.
• Digitallysigning
allpackets.Thisfeatureusescryptographicallystrongmessagedigeststo
authenticateallcommunications,preventinganattackerfromsuccessfullyinterceptingand
alteringinformation.
SSHserverisdisabledontheMatrixDFESeriesandN‐SAdevicesbydefault.InordertorunSSH
initsdefaultconfiguration,youmustcompletethefollowing
stepsdescribedinthissection.
•Generatehostkeys
•EnableSSHserver
About Host Keys
SSHserverauthenticatesitselftotheclientthroughahostkey.Hostkeysareasymmetric
encryptionkeyscommonlyusedinwhatisknownaspublickeycryptography.SSHserveruses
uniquehostkeys,eachconsistingofapairofkeys,generatedsimultaneously.Althoughthe
generatedkeysarerelated,onecannotbe
derivedfromtheother.Thefirstkeyofthegenerated
pair,thepublickey,canbepublishedfreelyandisusedbySSHclients tosecurelyidentifythe
SSHserver.Thesecondkeyofthegeneratedpair,thesecretkey,isstoredinasafeplaceand
shouldneverbe
divulged.ThiskeyisusedbytheSSHservertosecurelyidentifyitselftoSSH
clients.
TheSSH‐2protocolmakestwodistincttypesofhostkeysavailable:theDigitalSignature
Algorithm(DSA)andtheRivest‐Shamir‐Adleman(RSA)algorithm.BothDSAandRSAareNIST‐
approveddigitalsignaturealgorithms.
Afterverifying
serverauthenticity,theSSHclientgeneratesakeytouseuntilitdisconnectsfrom
theserver.Oncetheclientandserverhavecopiesofthekey,theywilluseittoencryptallfurther
communications.Inadditiontoencryptingeachpacket, boththeclientandserverwillstam p each
outgoing
packetwithdatathatcanbeusedtovalidatethecontentsofthepackets.Thisstamp
consistsofamessageauthenticationcode(MAC)createdbyusingasecuremessagedigest
algorithmsuchasSHA‐1orMD5.Ifthecontentofthepacketchangesen‐route,MAC
authenticationwillfail.