SSH (secure shell)

Computer Systems Lab Documentation : Frequently Asked Questions : SSH (secure shell)

1.5.1 What is SSH?

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands on a remote computer, and to move files from one computer to another, in a secure manner.


[ Back to Top ]

1.5.2 Why use SSH?

Regular telnet connections transmit your password over the net in "plaintext" -- your password is not encrypted or protected in any way. It is possible for others to eavesdrop on the network and capture your username and password. With your username and password, they can then easily use your account, reading or changing your files, electronic mail, etc.

With SSH, your password never is transmitted without strong encryption.

Similar functionality is available with Kerberos, however it is more difficult to install and configure on private computers. Kerberos has been installed on all CSL workstations.


[ Back to Top ]

1.5.3 Can I use ssh on CSL Workstations?

On UNIX systems:

SSH has been installed on CSL Unix workstations in /s/std/bin/ssh. When you wish to connect to a remote computer that supports ssh, type ssh remote-host where remote-host is the hostname of the other computer.

On Windows NT systems:

SecureCRT (ssh) is not installed on CSL Windows NT workstations at this time. You can continue to use Kerberos Telnet for secure connections from CSL Windows NT workstations to CSL Unix Workstations.

At the DOS prompt type ktel -x remote-host where remote-host is the hostname of the other computer (Unix only).


[ Back to Top ]

1.5.4 Can I use ssh from home?

SSH can easily be configured for use from a home computer. Please read the instructions given in HOW-TO use SSH to establish a remote connection and transfer files


[ Back to Top ]

1.5.5 Can I securely transfer files to and from CS Department computers?

To securely transfer files over the network, you must use SSH port forwarding to establish a secure FTP session.

See Also:


[ Back to Top ]

1.5.6 Can I use SSH to read my POP mail?

POP mail can be read remotely and securely, by using SSH and port forwarding.

See Also:


[ Back to Top ]

1.5.7 Why doesn't SSH RSA Authentication work?

RSA Authentication is method for SSH to automatically authenticate the client, without the user typing a password.

RSA authentication does not work with CSL computers because it is necessary to authenticate to the AFS filesystem. The login process handles AFS authentication, using the password you provide. Without a password, it is not possible to authenticate to AFS.

See Also:


[ Back to Top ]

1.5.8 Security Considerations with SSH

Note: The security issues in this section apply equally to any SSH program. This answer is mostly from the SecureCRT documenation, modified for the specific case of the Computer Sciences Department.

There are important network factors in understanding SSH Security, especially when using Port Forwarding.

It is important to understand that the client data is only encrypted between the computer that is running SSH (local or client computer) and the SSH server (remote computer) that SSH is connected to. Any data moving from the SSH server across the network to another server is not encrypted. Three configurations are presented below to illustrate different computer/network configurations and their effect on security. Your evaluation of the connection between Servers A and B is the critical factor in deciding whether the aggregate security meets your needs.

Configuration 1

SecureCRT (SSH) forwards the FTP connection to a remote ftp server which is a different computer than the SSH server.

In Configuration 1, the connection between Servers A and B could be:

Configuration 2

SecureCRT (SSH) forwards the FTP connection to an FTP server which is running on the same computer as the SSH server.

Configuration 3

A SecureCRT (SSH) connection is made between a Windows PC and a Unix server. A telnet session is then made from the Unix server to another site.


[ Back to Top ]

Documentation built by builddoc v1.09
run by ziel on Wed Mar 3 12:58:46 1999
Please do not link to this page. Please link only to the top level of the CSL documentation tree.