SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
DSSH

Juraj Bednár
The problem


●   SSH clients allow for a simple kind of “VPN access”

    ●   access control

    ●   channel protection through cryptography

●   Not well suited for “traversing through VPNs”

    ●   I have to login to our company's server

    ●   Then I can login to a customer's firewall (or use a VPN)

    ●   From there I can login to the server
The problem


●   What if I need to restart application on ten servers?

●   In addition, there's PermitRootLogin no

●   Passwords are (of course) different on each server

●   I have to decrypt the passwords (I can't remember passwords for

hundreds of servers), do an ssh, login through key, type “su -”, cut &

paste the password

    ●   Takes me tens of minutes
The solution: DSSH


●   Enter DSSH

●   Secure storage of key material through dssh-agent (much more

secure than ssh-agent)

●   Scriptable

●   In the end

    ●   Populate agent with material (one script involving gpg)

    ●   for i in 1 2 3 4 5 6 7 8 9 10;do dssh root@server${i} svcadm refresh

        applicationname; done
DSSH: Authentication



●   It is not always possible to use public key cryptography for

authentication

    ●   PermitRootLogin no

    ●   Some devices (network infrastructure) have no support for keys

    ●   Administrator does not need to know the passwords, he needs

        them properly used at the right time

    ●   Randomly generated passwords (different for each server)
DSSH: Authentication



●   DSSH<->Agent mutual authentication using X.509 certificates

●   Agent never reveals private key

●   DSSH client on your (trusted) machine does the key validation (even

if it's forwarded) and then decides if it will communicate with the server

(unlike ssh-agent from OpenSSH)
DSSH: scriptability


●   Scriptability through the use of BeanShell

●   Authentication, target server and how to connect there fully scriptable

    ●   Can have “internal hostnames”, that are resolved by script

    ●   Different paths for different servers

    ●   Some servers need to use “su” or “ena” for leveraging privileges

●   Logging and auditing support (root is root, but who used that

privilege?)
DSSH: portability and security


●   Uses Java (no buffer overflows, no integer overflows, ...)

●   Uses JCA (well-audited cryptography standards implementation)

●   Is open-source

●   Uses proven Java SSH library (used by Google or JetBrains)

●   Passwords don't matter at all -> can be changed by script

●   Needs only terminal emulator (xterm, linux console, mac os x

terminal) => works almost everywhere (haven't tried on Windows'

xterm or putty)
DSSH: Why Open-Source?


●   People know what we use to access their servers

●   Better quality of libraries and code (if we write code just for us, the

“let's document it later” approach will prevail)

●   We use a lot of open-source in DSSH, let's give something back

    ●   DSSH uses code from OpenSSH, Trilead-SSH, BeanShell, Java,

        GNU GetOpt, OpenCSV – we build on open technologies
History and future


●   Started as a tiny project, now supports most of the standard ssh

features (port forwarding, scp, ...)

●   Switched from Groovy to Beanshell, cut startup time to a third (the

rest is Java), project size and memory footprint from 2.2MB to 500KB

●   Future: Auditing “transit server” that records session for auditability

purposes

●   Users never ever store key material (other than their X.509 certificate)

on their computers, even in encrypted form
Thank you



                     Questions?



            http://opensource.digmia.com/

Mais conteúdo relacionado

Mais procurados

Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2GLC Networks
 
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp
 
OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...NETWAYS
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchainsDmitry Meshkov
 
Multi-core Node.pdf
Multi-core Node.pdfMulti-core Node.pdf
Multi-core Node.pdfAhmed Hassan
 
PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)David Timothy Strauss
 
Nodejs web service for starters
Nodejs web service for startersNodejs web service for starters
Nodejs web service for startersBruce Li
 
Attacking Big Data Land
Attacking Big Data LandAttacking Big Data Land
Attacking Big Data LandJeremy Brown
 
We shall play a game....
We shall play a game....We shall play a game....
We shall play a game....Sadia Textile
 
Масштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromeМасштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromePositive Hack Days
 
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...Mario Heiderich
 
Passwords#14 - mimikatz
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatzBenjamin Delpy
 
A slightly advanced introduction to node.js
A slightly advanced introduction to node.jsA slightly advanced introduction to node.js
A slightly advanced introduction to node.jsSudar Muthu
 
Построение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challengeПостроение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challengeOdessaFrontend
 
My journey from PHP to Node.js
My journey from PHP to Node.jsMy journey from PHP to Node.js
My journey from PHP to Node.jsValentin Lup
 
Node in Real Time - The Beginning
Node in Real Time - The BeginningNode in Real Time - The Beginning
Node in Real Time - The BeginningAxilis
 

Mais procurados (20)

Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2
 
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
 
OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchains
 
Multi-core Node.pdf
Multi-core Node.pdfMulti-core Node.pdf
Multi-core Node.pdf
 
PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)
 
Nodejs web service for starters
Nodejs web service for startersNodejs web service for starters
Nodejs web service for starters
 
Attacking Big Data Land
Attacking Big Data LandAttacking Big Data Land
Attacking Big Data Land
 
We shall play a game....
We shall play a game....We shall play a game....
We shall play a game....
 
Масштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromeМасштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google Chrome
 
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
 
Testing NodeJS Security
Testing NodeJS SecurityTesting NodeJS Security
Testing NodeJS Security
 
VXCON 2017
VXCON 2017VXCON 2017
VXCON 2017
 
Passwords#14 - mimikatz
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatz
 
A slightly advanced introduction to node.js
A slightly advanced introduction to node.jsA slightly advanced introduction to node.js
A slightly advanced introduction to node.js
 
Построение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challengeПостроение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challenge
 
Node js first look - 2016
Node js first look - 2016Node js first look - 2016
Node js first look - 2016
 
My journey from PHP to Node.js
My journey from PHP to Node.jsMy journey from PHP to Node.js
My journey from PHP to Node.js
 
Node in Real Time - The Beginning
Node in Real Time - The BeginningNode in Real Time - The Beginning
Node in Real Time - The Beginning
 

Destaque

Groovy Tutorial
Groovy TutorialGroovy Tutorial
Groovy TutorialPaul King
 
Blazing Performance with Flame Graphs
Blazing Performance with Flame GraphsBlazing Performance with Flame Graphs
Blazing Performance with Flame GraphsBrendan Gregg
 
Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09 Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09 Mary Rose
 
Managing Teams
Managing TeamsManaging Teams
Managing Teamsnckrishna
 
6 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 086 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 08Peer Resource Group
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityMichelle Bruno
 
Patient Recruitment In Emerging Regions July 2010
Patient Recruitment In Emerging Regions  July 2010Patient Recruitment In Emerging Regions  July 2010
Patient Recruitment In Emerging Regions July 2010Mukesh Kumar, PhD, RAC
 
Collaborize Overview
Collaborize OverviewCollaborize Overview
Collaborize OverviewRBolden
 
Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09Guy Davis
 
Social Media and Face-to-Face Meetings
Social Media and Face-to-Face MeetingsSocial Media and Face-to-Face Meetings
Social Media and Face-to-Face MeetingsMichelle Bruno
 
PecteSNami
PecteSNamiPecteSNami
PecteSNamijana203
 
Examples of My Work and Creativity
Examples of My Work and CreativityExamples of My Work and Creativity
Examples of My Work and Creativityleewpederson
 

Destaque (20)

Groovy Tutorial
Groovy TutorialGroovy Tutorial
Groovy Tutorial
 
Blazing Performance with Flame Graphs
Blazing Performance with Flame GraphsBlazing Performance with Flame Graphs
Blazing Performance with Flame Graphs
 
Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09 Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09
 
Sectors De ProducciçO
Sectors De ProducciçOSectors De ProducciçO
Sectors De ProducciçO
 
Managing Teams
Managing TeamsManaging Teams
Managing Teams
 
6 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 086 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 08
 
Black
BlackBlack
Black
 
Engage 2010
Engage 2010Engage 2010
Engage 2010
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for Charity
 
Patient Recruitment In Emerging Regions July 2010
Patient Recruitment In Emerging Regions  July 2010Patient Recruitment In Emerging Regions  July 2010
Patient Recruitment In Emerging Regions July 2010
 
Collaborize Overview
Collaborize OverviewCollaborize Overview
Collaborize Overview
 
Micul Inger
Micul IngerMicul Inger
Micul Inger
 
Artgroup
ArtgroupArtgroup
Artgroup
 
Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09
 
Social Media and Face-to-Face Meetings
Social Media and Face-to-Face MeetingsSocial Media and Face-to-Face Meetings
Social Media and Face-to-Face Meetings
 
Save power
Save powerSave power
Save power
 
PecteSNami
PecteSNamiPecteSNami
PecteSNami
 
Examples of My Work and Creativity
Examples of My Work and CreativityExamples of My Work and Creativity
Examples of My Work and Creativity
 
Walking The Walk
Walking The WalkWalking The Walk
Walking The Walk
 
Pp5
Pp5Pp5
Pp5
 

Semelhante a DSSH: Innovation in SSH

Presentation nix
Presentation nixPresentation nix
Presentation nixfangjiafu
 
Presentation nix
Presentation nixPresentation nix
Presentation nixfangjiafu
 
SSH for pen-testers
SSH for pen-testersSSH for pen-testers
SSH for pen-testersE D Williams
 
encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)Alastair Irvine
 
Ssh
SshSsh
Sshgh02
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Higher Level Malware
Higher Level MalwareHigher Level Malware
Higher Level MalwareCTruncer
 
SSH Tunneling
SSH TunnelingSSH Tunneling
SSH TunnelingThanh Tai
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access darkRoyce Davis
 
Security Concepts - Linux
Security Concepts - LinuxSecurity Concepts - Linux
Security Concepts - LinuxHenry Osborne
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Abhishek Kumar
 
Tatu: ssh as a service
Tatu: ssh as a serviceTatu: ssh as a service
Tatu: ssh as a servicePino deCandia
 
Ssh that wonderful thing
Ssh that wonderful thingSsh that wonderful thing
Ssh that wonderful thingMarc Cluet
 
User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015Netgate
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingCTruncer
 

Semelhante a DSSH: Innovation in SSH (20)

Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
Presentation nix
Presentation nixPresentation nix
Presentation nix
 
Presentation nix
Presentation nixPresentation nix
Presentation nix
 
SSH for pen-testers
SSH for pen-testersSSH for pen-testers
SSH for pen-testers
 
encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
Ssh
SshSsh
Ssh
 
Gwc3
Gwc3Gwc3
Gwc3
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Higher Level Malware
Higher Level MalwareHigher Level Malware
Higher Level Malware
 
SSH Tunneling
SSH TunnelingSSH Tunneling
SSH Tunneling
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access dark
 
Security Concepts - Linux
Security Concepts - LinuxSecurity Concepts - Linux
Security Concepts - Linux
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
Tatu: ssh as a service
Tatu: ssh as a serviceTatu: ssh as a service
Tatu: ssh as a service
 
Ssh that wonderful thing
Ssh that wonderful thingSsh that wonderful thing
Ssh that wonderful thing
 
Adhocr T-dose 2012
Adhocr T-dose 2012Adhocr T-dose 2012
Adhocr T-dose 2012
 
User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while Persisting
 

Mais de Juraj Bednar

Optionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPPOptionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPPJuraj Bednar
 
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...Juraj Bednar
 
Tedsig introduction
Tedsig introductionTedsig introduction
Tedsig introductionJuraj Bednar
 
Úvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná PolisÚvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná PolisJuraj Bednar
 
Mne to na notebooku funguje
Mne to na notebooku fungujeMne to na notebooku funguje
Mne to na notebooku fungujeJuraj Bednar
 
Sifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych spravSifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych spravJuraj Bednar
 
Processing workshop intro
Processing workshop introProcessing workshop intro
Processing workshop introJuraj Bednar
 
Processing a Arduino
Processing a ArduinoProcessing a Arduino
Processing a ArduinoJuraj Bednar
 
Processing and Arduino
Processing and ArduinoProcessing and Arduino
Processing and ArduinoJuraj Bednar
 
Úvod do umelej inteligencie
Úvod do umelej inteligencieÚvod do umelej inteligencie
Úvod do umelej inteligencieJuraj Bednar
 
Progressbar promo - slovenska verzia
Progressbar promo - slovenska verziaProgressbar promo - slovenska verzia
Progressbar promo - slovenska verziaJuraj Bednar
 
Progressbar promo - english version
Progressbar promo - english versionProgressbar promo - english version
Progressbar promo - english versionJuraj Bednar
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcampJuraj Bednar
 

Mais de Juraj Bednar (15)

Optionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPPOptionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPP
 
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
 
Tedsig introduction
Tedsig introductionTedsig introduction
Tedsig introduction
 
Úvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná PolisÚvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná Polis
 
Mne to na notebooku funguje
Mne to na notebooku fungujeMne to na notebooku funguje
Mne to na notebooku funguje
 
Sifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych spravSifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych sprav
 
Tedx hacktivism
Tedx hacktivismTedx hacktivism
Tedx hacktivism
 
Processing workshop intro
Processing workshop introProcessing workshop intro
Processing workshop intro
 
Phone security
Phone securityPhone security
Phone security
 
Processing a Arduino
Processing a ArduinoProcessing a Arduino
Processing a Arduino
 
Processing and Arduino
Processing and ArduinoProcessing and Arduino
Processing and Arduino
 
Úvod do umelej inteligencie
Úvod do umelej inteligencieÚvod do umelej inteligencie
Úvod do umelej inteligencie
 
Progressbar promo - slovenska verzia
Progressbar promo - slovenska verziaProgressbar promo - slovenska verzia
Progressbar promo - slovenska verzia
 
Progressbar promo - english version
Progressbar promo - english versionProgressbar promo - english version
Progressbar promo - english version
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcamp
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

DSSH: Innovation in SSH

  • 2. The problem ● SSH clients allow for a simple kind of “VPN access” ● access control ● channel protection through cryptography ● Not well suited for “traversing through VPNs” ● I have to login to our company's server ● Then I can login to a customer's firewall (or use a VPN) ● From there I can login to the server
  • 3. The problem ● What if I need to restart application on ten servers? ● In addition, there's PermitRootLogin no ● Passwords are (of course) different on each server ● I have to decrypt the passwords (I can't remember passwords for hundreds of servers), do an ssh, login through key, type “su -”, cut & paste the password ● Takes me tens of minutes
  • 4. The solution: DSSH ● Enter DSSH ● Secure storage of key material through dssh-agent (much more secure than ssh-agent) ● Scriptable ● In the end ● Populate agent with material (one script involving gpg) ● for i in 1 2 3 4 5 6 7 8 9 10;do dssh root@server${i} svcadm refresh applicationname; done
  • 5. DSSH: Authentication ● It is not always possible to use public key cryptography for authentication ● PermitRootLogin no ● Some devices (network infrastructure) have no support for keys ● Administrator does not need to know the passwords, he needs them properly used at the right time ● Randomly generated passwords (different for each server)
  • 6. DSSH: Authentication ● DSSH<->Agent mutual authentication using X.509 certificates ● Agent never reveals private key ● DSSH client on your (trusted) machine does the key validation (even if it's forwarded) and then decides if it will communicate with the server (unlike ssh-agent from OpenSSH)
  • 7. DSSH: scriptability ● Scriptability through the use of BeanShell ● Authentication, target server and how to connect there fully scriptable ● Can have “internal hostnames”, that are resolved by script ● Different paths for different servers ● Some servers need to use “su” or “ena” for leveraging privileges ● Logging and auditing support (root is root, but who used that privilege?)
  • 8. DSSH: portability and security ● Uses Java (no buffer overflows, no integer overflows, ...) ● Uses JCA (well-audited cryptography standards implementation) ● Is open-source ● Uses proven Java SSH library (used by Google or JetBrains) ● Passwords don't matter at all -> can be changed by script ● Needs only terminal emulator (xterm, linux console, mac os x terminal) => works almost everywhere (haven't tried on Windows' xterm or putty)
  • 9. DSSH: Why Open-Source? ● People know what we use to access their servers ● Better quality of libraries and code (if we write code just for us, the “let's document it later” approach will prevail) ● We use a lot of open-source in DSSH, let's give something back ● DSSH uses code from OpenSSH, Trilead-SSH, BeanShell, Java, GNU GetOpt, OpenCSV – we build on open technologies
  • 10. History and future ● Started as a tiny project, now supports most of the standard ssh features (port forwarding, scp, ...) ● Switched from Groovy to Beanshell, cut startup time to a third (the rest is Java), project size and memory footprint from 2.2MB to 500KB ● Future: Auditing “transit server” that records session for auditability purposes ● Users never ever store key material (other than their X.509 certificate) on their computers, even in encrypted form
  • 11. Thank you Questions? http://opensource.digmia.com/