CERN Accelerating science

This website is no longer maintained. Its content may be obsolete. Please visit http://home.cern/ for current CERN information.

CERN home pageCERN home pageDocuments by ReferenceDocuments by ReferenceCNLsCNLsYear 2002Year 2002Help, Info about this page

Contents
Index

Editorial Information
Editorial
If you need help
Announcements Physics Computing Desktop Computing Internet Services and Network Scientific Applications and Software Engineering The Learning Zone User Documentation Just For Fun ...
Previous:Physics Computing
Next:News on Linux RedHat 7.2.1
 (If you want to print this article)



Recommendation to Use SSH at CERN

Jan Iven, Denise Heagerty , CERN Computer Security Team


Abstract

CERN recommends the use of secure shell (SSH) to replace less secure commands, such as telnet, ftp and the BSD r-commands (rsh, rlogin, rexec, rcp). This article explains how ssh improves security, the importance of installing and using ssh locally to secure your complete connection, and provides links to installation instructions for UNIX and Windows. Full information is available at http://cern.ch/security/ssh


Why use SSH?

Attackers routinely use passwords from legitimate users connecting to or from a CERN machine. These passwords are usually obtained from watching ("sniffing") the network traffic of that user. The user's account can then be used to attack other machines, both inside and outside CERN. To prevent attackers from obtaining these passwords, encryption must be used.

Secure shell (SSH) is a network protocol and tool suite to transparently encrypt network traffic. It is designed to replace telnet, ftp and the BSD r-commands (rsh, rlogin, rexec, rcp), all of which transmit passwords as cleartext and are vulnerable to connection hijacking. It offers secure port forwarding and can therefore be used to encrypt other network traffic (e.g. X11) as well.

Advice on using SSH securely

Using ssh does not automatically solve all security problems, and it has to be used correctly in order to be useful:

  • ssh is only secure when used end to end, i.e. directly from one trusted computer to a trusted server. You are advised to install and use ssh on your local system. (Note that using telnet or X11 to connect to a remote ssh client computer will still expose passwords in cleartext, as these applications do not encrypyt.)
  • Passwords must still be regularly changed: An already-stolen password will continue to work over ssh, and although the encryption mechanism is generally assumed to be secure, passwords may still be discovered. Password advice is at http://cern.ch/security/passwords.

Installing SSH at CERN

Documentation is provided in the "SSH at CERN" web site for:

Using SSH to encrypt other applications

References

Contact

Comments and questions should be sent at Computer.Security@cern.ch
About the author(s): Jan Iven is a member of the CERN Computer Security Team, specialised in Linux and SSH. Denise Heagerty is the CERN Computer Security Officer.


For matters related to this article please contact the author.
Cnl.Editor@cern.ch


CERN-CNL-2002-002
Vol. XXXVII, issue no 2


Last Updated on Tue Jul 02 14:43:09 CEST 2002.
Copyright © CERN 2002 -- European Organization for Nuclear Research