SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
DSSH

Juraj Bednár
The problem


●   SSH clients allow for a simple kind of “VPN access”

    ●   access control

    ●   channel protection through cryptography

●   Not well suited for “traversing through VPNs”

    ●   I have to login to our company's server

    ●   Then I can login to a customer's firewall (or use a VPN)

    ●   From there I can login to the server
The problem


●   What if I need to restart application on ten servers?

●   In addition, there's PermitRootLogin no

●   Passwords are (of course) different on each server

●   I have to decrypt the passwords (I can't remember passwords for

hundreds of servers), do an ssh, login through key, type “su -”, cut &

paste the password

    ●   Takes me tens of minutes
The solution: DSSH


●   Enter DSSH

●   Secure storage of key material through dssh-agent (much more

secure than ssh-agent)

●   Scriptable

●   In the end

    ●   Populate agent with material (one script involving gpg)

    ●   for i in 1 2 3 4 5 6 7 8 9 10;do dssh root@server${i} svcadm refresh

        applicationname; done
DSSH: Authentication



●   It is not always possible to use public key cryptography for

authentication

    ●   PermitRootLogin no

    ●   Some devices (network infrastructure) have no support for keys

    ●   Administrator does not need to know the passwords, he needs

        them properly used at the right time

    ●   Randomly generated passwords (different for each server)
DSSH: Authentication



●   DSSH<->Agent mutual authentication using X.509 certificates

●   Agent never reveals private key

●   DSSH client on your (trusted) machine does the key validation (even

if it's forwarded) and then decides if it will communicate with the server

(unlike ssh-agent from OpenSSH)
DSSH: scriptability


●   Scriptability through the use of BeanShell

●   Authentication, target server and how to connect there fully scriptable

    ●   Can have “internal hostnames”, that are resolved by script

    ●   Different paths for different servers

    ●   Some servers need to use “su” or “ena” for leveraging privileges

●   Logging and auditing support (root is root, but who used that

privilege?)
DSSH: portability and security


●   Uses Java (no buffer overflows, no integer overflows, ...)

●   Uses JCA (well-audited cryptography standards implementation)

●   Is open-source

●   Uses proven Java SSH library (used by Google or JetBrains)

●   Passwords don't matter at all -> can be changed by script

●   Needs only terminal emulator (xterm, linux console, mac os x

terminal) => works almost everywhere (haven't tried on Windows'

xterm or putty)
DSSH: Why Open-Source?


●   People know what we use to access their servers

●   Better quality of libraries and code (if we write code just for us, the

“let's document it later” approach will prevail)

●   We use a lot of open-source in DSSH, let's give something back

    ●   DSSH uses code from OpenSSH, Trilead-SSH, BeanShell, Java,

        GNU GetOpt, OpenCSV – we build on open technologies
History and future


●   Started as a tiny project, now supports most of the standard ssh

features (port forwarding, scp, ...)

●   Switched from Groovy to Beanshell, cut startup time to a third (the

rest is Java), project size and memory footprint from 2.2MB to 500KB

●   Future: Auditing “transit server” that records session for auditability

purposes

●   Users never ever store key material (other than their X.509 certificate)

on their computers, even in encrypted form
Thank you



                     Questions?



            http://opensource.digmia.com/

Mais conteúdo relacionado

Mais procurados

Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2GLC Networks
 
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp
 
OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...NETWAYS
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchainsDmitry Meshkov
 
Multi-core Node.pdf
Multi-core Node.pdfMulti-core Node.pdf
Multi-core Node.pdfAhmed Hassan
 
PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)David Timothy Strauss
 
Nodejs web service for starters
Nodejs web service for startersNodejs web service for starters
Nodejs web service for startersBruce Li
 
Attacking Big Data Land
Attacking Big Data LandAttacking Big Data Land
Attacking Big Data LandJeremy Brown
 
We shall play a game....
We shall play a game....We shall play a game....
We shall play a game....Sadia Textile
 
Масштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromeМасштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromePositive Hack Days
 
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...Mario Heiderich
 
Passwords#14 - mimikatz
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatzBenjamin Delpy
 
A slightly advanced introduction to node.js
A slightly advanced introduction to node.jsA slightly advanced introduction to node.js
A slightly advanced introduction to node.jsSudar Muthu
 
Построение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challengeПостроение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challengeOdessaFrontend
 
My journey from PHP to Node.js
My journey from PHP to Node.jsMy journey from PHP to Node.js
My journey from PHP to Node.jsValentin Lup
 
Node in Real Time - The Beginning
Node in Real Time - The BeginningNode in Real Time - The Beginning
Node in Real Time - The BeginningAxilis
 

Mais procurados (20)

Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2Up and Running SSH Service - Part 2
Up and Running SSH Service - Part 2
 
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn ViệtSecurity Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
Security Bootcamp 2013 - Difficulties of malware analysis - Nguyễn Chấn Việt
 
OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...OSMC 2018 | Handling messages and notifications from software and gadgets wit...
OSMC 2018 | Handling messages and notifications from software and gadgets wit...
 
Real world blockchains
Real world blockchainsReal world blockchains
Real world blockchains
 
Multi-core Node.pdf
Multi-core Node.pdfMulti-core Node.pdf
Multi-core Node.pdf
 
PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)
 
Nodejs web service for starters
Nodejs web service for startersNodejs web service for starters
Nodejs web service for starters
 
Attacking Big Data Land
Attacking Big Data LandAttacking Big Data Land
Attacking Big Data Land
 
We shall play a game....
We shall play a game....We shall play a game....
We shall play a game....
 
Масштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google ChromeМасштабируемый и эффективный фаззинг Google Chrome
Масштабируемый и эффективный фаззинг Google Chrome
 
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
ECMAScript 6 from an Attacker's Perspective - Breaking Frameworks, Sandboxes,...
 
Node.js Introduction
Node.js IntroductionNode.js Introduction
Node.js Introduction
 
Testing NodeJS Security
Testing NodeJS SecurityTesting NodeJS Security
Testing NodeJS Security
 
VXCON 2017
VXCON 2017VXCON 2017
VXCON 2017
 
Passwords#14 - mimikatz
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatz
 
A slightly advanced introduction to node.js
A slightly advanced introduction to node.jsA slightly advanced introduction to node.js
A slightly advanced introduction to node.js
 
Построение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challengeПостроение простого REST сервера на Node.js | Odessa Frontend Code challenge
Построение простого REST сервера на Node.js | Odessa Frontend Code challenge
 
Node js first look - 2016
Node js first look - 2016Node js first look - 2016
Node js first look - 2016
 
My journey from PHP to Node.js
My journey from PHP to Node.jsMy journey from PHP to Node.js
My journey from PHP to Node.js
 
Node in Real Time - The Beginning
Node in Real Time - The BeginningNode in Real Time - The Beginning
Node in Real Time - The Beginning
 

Destaque

Groovy Tutorial
Groovy TutorialGroovy Tutorial
Groovy TutorialPaul King
 
Blazing Performance with Flame Graphs
Blazing Performance with Flame GraphsBlazing Performance with Flame Graphs
Blazing Performance with Flame GraphsBrendan Gregg
 
Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09 Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09 Mary Rose
 
Managing Teams
Managing TeamsManaging Teams
Managing Teamsnckrishna
 
6 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 086 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 08Peer Resource Group
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityMichelle Bruno
 
Patient Recruitment In Emerging Regions July 2010
Patient Recruitment In Emerging Regions  July 2010Patient Recruitment In Emerging Regions  July 2010
Patient Recruitment In Emerging Regions July 2010Mukesh Kumar, PhD, RAC
 
Collaborize Overview
Collaborize OverviewCollaborize Overview
Collaborize OverviewRBolden
 
Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09Guy Davis
 
Social Media and Face-to-Face Meetings
Social Media and Face-to-Face MeetingsSocial Media and Face-to-Face Meetings
Social Media and Face-to-Face MeetingsMichelle Bruno
 
PecteSNami
PecteSNamiPecteSNami
PecteSNamijana203
 
Examples of My Work and Creativity
Examples of My Work and CreativityExamples of My Work and Creativity
Examples of My Work and Creativityleewpederson
 

Destaque (20)

Groovy Tutorial
Groovy TutorialGroovy Tutorial
Groovy Tutorial
 
Blazing Performance with Flame Graphs
Blazing Performance with Flame GraphsBlazing Performance with Flame Graphs
Blazing Performance with Flame Graphs
 
Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09 Redwood Cradle to cradle Innov_ex 09
Redwood Cradle to cradle Innov_ex 09
 
Sectors De ProducciçO
Sectors De ProducciçOSectors De ProducciçO
Sectors De ProducciçO
 
Managing Teams
Managing TeamsManaging Teams
Managing Teams
 
6 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 086 Differentiating Marketplace11 24 08
6 Differentiating Marketplace11 24 08
 
Black
BlackBlack
Black
 
Engage 2010
Engage 2010Engage 2010
Engage 2010
 
Going Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for CharityGoing Once, Twice... Tech that Brings in More Money for Charity
Going Once, Twice... Tech that Brings in More Money for Charity
 
Patient Recruitment In Emerging Regions July 2010
Patient Recruitment In Emerging Regions  July 2010Patient Recruitment In Emerging Regions  July 2010
Patient Recruitment In Emerging Regions July 2010
 
Collaborize Overview
Collaborize OverviewCollaborize Overview
Collaborize Overview
 
Micul Inger
Micul IngerMicul Inger
Micul Inger
 
Artgroup
ArtgroupArtgroup
Artgroup
 
Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09Incomes Outcomes How Come 9 09
Incomes Outcomes How Come 9 09
 
Social Media and Face-to-Face Meetings
Social Media and Face-to-Face MeetingsSocial Media and Face-to-Face Meetings
Social Media and Face-to-Face Meetings
 
Save power
Save powerSave power
Save power
 
PecteSNami
PecteSNamiPecteSNami
PecteSNami
 
Examples of My Work and Creativity
Examples of My Work and CreativityExamples of My Work and Creativity
Examples of My Work and Creativity
 
Walking The Walk
Walking The WalkWalking The Walk
Walking The Walk
 
Pp5
Pp5Pp5
Pp5
 

Semelhante a DSSH: Innovation in SSH

Presentation nix
Presentation nixPresentation nix
Presentation nixfangjiafu
 
Presentation nix
Presentation nixPresentation nix
Presentation nixfangjiafu
 
SSH for pen-testers
SSH for pen-testersSSH for pen-testers
SSH for pen-testersE D Williams
 
encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)Alastair Irvine
 
Ssh
SshSsh
Sshgh02
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2Iftach Ian Amit
 
Higher Level Malware
Higher Level MalwareHigher Level Malware
Higher Level MalwareCTruncer
 
SSH Tunneling
SSH TunnelingSSH Tunneling
SSH TunnelingThanh Tai
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access darkRoyce Davis
 
Security Concepts - Linux
Security Concepts - LinuxSecurity Concepts - Linux
Security Concepts - LinuxHenry Osborne
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Abhishek Kumar
 
Tatu: ssh as a service
Tatu: ssh as a serviceTatu: ssh as a service
Tatu: ssh as a servicePino deCandia
 
Ssh that wonderful thing
Ssh that wonderful thingSsh that wonderful thing
Ssh that wonderful thingMarc Cluet
 
User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015Netgate
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingCTruncer
 

Semelhante a DSSH: Innovation in SSH (20)

Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 
Presentation nix
Presentation nixPresentation nix
Presentation nix
 
Presentation nix
Presentation nixPresentation nix
Presentation nix
 
SSH for pen-testers
SSH for pen-testersSSH for pen-testers
SSH for pen-testers
 
encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)encryption presentation (SAGE-WA, 2010-10-05)
encryption presentation (SAGE-WA, 2010-10-05)
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
Ssh
SshSsh
Ssh
 
Gwc3
Gwc3Gwc3
Gwc3
 
Passwords good badugly181212-2
Passwords good badugly181212-2Passwords good badugly181212-2
Passwords good badugly181212-2
 
Higher Level Malware
Higher Level MalwareHigher Level Malware
Higher Level Malware
 
SSH Tunneling
SSH TunnelingSSH Tunneling
SSH Tunneling
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access dark
 
Security Concepts - Linux
Security Concepts - LinuxSecurity Concepts - Linux
Security Concepts - Linux
 
Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)Insecurity-In-Security version.1 (2010)
Insecurity-In-Security version.1 (2010)
 
Tatu: ssh as a service
Tatu: ssh as a serviceTatu: ssh as a service
Tatu: ssh as a service
 
Ssh that wonderful thing
Ssh that wonderful thingSsh that wonderful thing
Ssh that wonderful thing
 
Adhocr T-dose 2012
Adhocr T-dose 2012Adhocr T-dose 2012
Adhocr T-dose 2012
 
User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015User Management and Privileges - pfSense Hangout February 2015
User Management and Privileges - pfSense Hangout February 2015
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
 
The Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while PersistingThe Supporting Role of Antivirus Evasion while Persisting
The Supporting Role of Antivirus Evasion while Persisting
 

Mais de Juraj Bednar

Optionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPPOptionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPPJuraj Bednar
 
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...Juraj Bednar
 
Tedsig introduction
Tedsig introductionTedsig introduction
Tedsig introductionJuraj Bednar
 
Úvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná PolisÚvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná PolisJuraj Bednar
 
Mne to na notebooku funguje
Mne to na notebooku fungujeMne to na notebooku funguje
Mne to na notebooku fungujeJuraj Bednar
 
Sifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych spravSifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych spravJuraj Bednar
 
Processing workshop intro
Processing workshop introProcessing workshop intro
Processing workshop introJuraj Bednar
 
Processing a Arduino
Processing a ArduinoProcessing a Arduino
Processing a ArduinoJuraj Bednar
 
Processing and Arduino
Processing and ArduinoProcessing and Arduino
Processing and ArduinoJuraj Bednar
 
Úvod do umelej inteligencie
Úvod do umelej inteligencieÚvod do umelej inteligencie
Úvod do umelej inteligencieJuraj Bednar
 
Progressbar promo - slovenska verzia
Progressbar promo - slovenska verziaProgressbar promo - slovenska verzia
Progressbar promo - slovenska verziaJuraj Bednar
 
Progressbar promo - english version
Progressbar promo - english versionProgressbar promo - english version
Progressbar promo - english versionJuraj Bednar
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcampJuraj Bednar
 

Mais de Juraj Bednar (15)

Optionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPPOptionality, uncertainty and freedom from HCPP
Optionality, uncertainty and freedom from HCPP
 
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
Biohacking a mentální koučing - Miroslav Nečas, Biohacking meetup Paralelná p...
 
Tedsig introduction
Tedsig introductionTedsig introduction
Tedsig introduction
 
Úvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná PolisÚvod do biohackingu, Paralelná Polis
Úvod do biohackingu, Paralelná Polis
 
Mne to na notebooku funguje
Mne to na notebooku fungujeMne to na notebooku funguje
Mne to na notebooku funguje
 
Sifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych spravSifrovanie hovorov a textovych sprav
Sifrovanie hovorov a textovych sprav
 
Tedx hacktivism
Tedx hacktivismTedx hacktivism
Tedx hacktivism
 
Processing workshop intro
Processing workshop introProcessing workshop intro
Processing workshop intro
 
Phone security
Phone securityPhone security
Phone security
 
Processing a Arduino
Processing a ArduinoProcessing a Arduino
Processing a Arduino
 
Processing and Arduino
Processing and ArduinoProcessing and Arduino
Processing and Arduino
 
Úvod do umelej inteligencie
Úvod do umelej inteligencieÚvod do umelej inteligencie
Úvod do umelej inteligencie
 
Progressbar promo - slovenska verzia
Progressbar promo - slovenska verziaProgressbar promo - slovenska verzia
Progressbar promo - slovenska verzia
 
Progressbar promo - english version
Progressbar promo - english versionProgressbar promo - english version
Progressbar promo - english version
 
Telefónia a VoIP barcamp
Telefónia a VoIP barcampTelefónia a VoIP barcamp
Telefónia a VoIP barcamp
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

DSSH: Innovation in SSH

  • 2. The problem ● SSH clients allow for a simple kind of “VPN access” ● access control ● channel protection through cryptography ● Not well suited for “traversing through VPNs” ● I have to login to our company's server ● Then I can login to a customer's firewall (or use a VPN) ● From there I can login to the server
  • 3. The problem ● What if I need to restart application on ten servers? ● In addition, there's PermitRootLogin no ● Passwords are (of course) different on each server ● I have to decrypt the passwords (I can't remember passwords for hundreds of servers), do an ssh, login through key, type “su -”, cut & paste the password ● Takes me tens of minutes
  • 4. The solution: DSSH ● Enter DSSH ● Secure storage of key material through dssh-agent (much more secure than ssh-agent) ● Scriptable ● In the end ● Populate agent with material (one script involving gpg) ● for i in 1 2 3 4 5 6 7 8 9 10;do dssh root@server${i} svcadm refresh applicationname; done
  • 5. DSSH: Authentication ● It is not always possible to use public key cryptography for authentication ● PermitRootLogin no ● Some devices (network infrastructure) have no support for keys ● Administrator does not need to know the passwords, he needs them properly used at the right time ● Randomly generated passwords (different for each server)
  • 6. DSSH: Authentication ● DSSH<->Agent mutual authentication using X.509 certificates ● Agent never reveals private key ● DSSH client on your (trusted) machine does the key validation (even if it's forwarded) and then decides if it will communicate with the server (unlike ssh-agent from OpenSSH)
  • 7. DSSH: scriptability ● Scriptability through the use of BeanShell ● Authentication, target server and how to connect there fully scriptable ● Can have “internal hostnames”, that are resolved by script ● Different paths for different servers ● Some servers need to use “su” or “ena” for leveraging privileges ● Logging and auditing support (root is root, but who used that privilege?)
  • 8. DSSH: portability and security ● Uses Java (no buffer overflows, no integer overflows, ...) ● Uses JCA (well-audited cryptography standards implementation) ● Is open-source ● Uses proven Java SSH library (used by Google or JetBrains) ● Passwords don't matter at all -> can be changed by script ● Needs only terminal emulator (xterm, linux console, mac os x terminal) => works almost everywhere (haven't tried on Windows' xterm or putty)
  • 9. DSSH: Why Open-Source? ● People know what we use to access their servers ● Better quality of libraries and code (if we write code just for us, the “let's document it later” approach will prevail) ● We use a lot of open-source in DSSH, let's give something back ● DSSH uses code from OpenSSH, Trilead-SSH, BeanShell, Java, GNU GetOpt, OpenCSV – we build on open technologies
  • 10. History and future ● Started as a tiny project, now supports most of the standard ssh features (port forwarding, scp, ...) ● Switched from Groovy to Beanshell, cut startup time to a third (the rest is Java), project size and memory footprint from 2.2MB to 500KB ● Future: Auditing “transit server” that records session for auditability purposes ● Users never ever store key material (other than their X.509 certificate) on their computers, even in encrypted form
  • 11. Thank you Questions? http://opensource.digmia.com/