Simple way to protect SSH against or not protect against


Cheap reseller Hosting


Protect SSh

SSH will protect against

Seven important steps to Secure Shell protects against (again, from the README)

Step 1) Eavesdropping of data transmitted over the network.

Step 2) Manipulation of data at intermediate elements in the hosts.

Step 3) IP address spoofing where an attack hosts pretends to be a trusted host by sending packets with the source address of the trusted host. Ssh even protects against a spoofer on the local network, who can pretend he is your router to the outside.

Step 4) DNS spoofing of trusted host names/IP addresses, where an attacker forges name server records

Step 5) IP source routing, where a host can pretend that an IP packet comes from another, trusted host.

Step 6) Interception of cleartext passwords and other data by intermediate hosts.

Step 7) Attacks based on listening to X authentication data and spoofed connection to the X11 server

 

SSH will not protect against

Secure Shell will not help you with anything that compromises your host’s security in some other way. Once an attacker has gained root access to a machine, he can then subvert ssh, too.

Step 1) Incorrect configuration or usages.

Step 2) A compromised root accounts.

Step 3) Insecure home directories: if an attacker can modify files in your home directory (e.g. via NFS) he may be able to fool SSH

 

 


Cheap web Hosting


SSH – Secure Shell – What is it ?


Cheap reseller Hosting


SSH stands for Secure Shell and is a secure method of accessing remote systems. Wit SSH, you can login to your Linux or Unix shell command prompt and execute commands as if you were sitting right in front of the server typing at the console. SSH has a wonderful feature called SSH Port Forwarding, sometimes called SSH Tunneling, which allows you to establish a secure SSH session and then tunnel arbitrary TCP connections through it. Tunnels can be created at any time, with almost no effort and no programming, which makes them very appealing. SSH Port Forwarding can be used for secure communications in a myriad of different ways.

ssh

What is SSH?

1) The Secure Shell

2) It is a protocol not a product

3) Software based approach to network security

4) Encrypts the data sent between the computers

5) Client/Server architecture

6) Comes with all Linux distribution, Mac OS X, AIX, Sun Solaris,OpenBSD and other Unix variants

7) Ported to other operating systems, such as Windows, Palm OS,
Amiga, etc.

8) Other clients, such as, scp, sftp, etc. are also available

9) Replacement for telnet, rlogin, rsh, rcp, ftp, etc

What SSH is Not?

1) It is not a true shell like csh, ksh, sh, etc.

2)It is not a command interpreter

3) It creates secure channel for running commands on remote
computer

4) It is not a complete security solution

5) It will not protect against trojans, viruses, etc

SSH Advantages

1) IP source routing

2) DNS Spoofing

3) Data manipulation at things like routers along the network.

4) Eavesdropping or sniffing of the transmitted data.

5) IP address spoofing

Benefit of SSH Tunneling

There are several benefits to using SSH:

1) Connection to a server from behind a firewall when the server port is blocked.

2) Automatic authentication of users, no passwords sent in plain text to prevent the stealing of passwords.

3) Multiple strong authentication methods that prevent such security threats as spoofing identity.

4) Encryption and compression of data for security and speed.
Secure file transfer.


Cheap web Hosting