Advertisment

Secure Communication through SSH

author-image
PCQ Bureau
New Update

Infrastructure consolidation is a key trend nowadays, and
just about every enterprise is doing it. This has turned simple server rooms
into complex data centers. Managing them therefore has become a key challenge.
Plus, in allowing your remote offices to access them raises security concerns.
This has created a need for secure remote management solutions, and in this
article, we'll talk about one such solution called SSH Tectia client/server.
It provides end-to-end secure communication within a corporate network. You can
have secure system administration, secure application connectivity and secure
file transfers. As the name suggests, the software uses Secure Shell (SecSh)
technology to provide secure communication. Secure Shell secures connections
over the Internet by encrypting passwords and other data. It provides strong
authentication and secure communications over unsecured networks (like the
Internet). It provides security at the application layer of the TCP/IP protocol
stack.

Advertisment
Direct
Hit!
Applies
to:
IT Managers
USP:
Configure Tectia on your LAN for secure, remote server administration
Links:
http://www.ssh.com/ 
Google
keywords:
SSH secure communication
On the PCQEnterprise CD:
\IT Mgmt\Tectia.zip

Version overview

The SSH Tectia client/server solution is available for Unix, Linux, Windows
and Solaris. It comes in three versions-A, F,  and T. SSH Tectia Server
(A) is designed for secure system administration, enabling system administrators
to remotely administer application servers and other network resources using
secure terminal and file transfer connections. Server F version provides file
transfers when used in conjunction with SSH Tectia Client with version A
capabilities. And the T version provides Application tunneling and includes all
features of F and A. In server side authentication, SSH Tectia uses
cryptographic authentication for server hosts. Each server has a cryptographic
key pair (a public key and a private key) that identifies the server. Whenever a
Secure Shell client connects to a Secure Shell server, the server authenticates
itself to the client cryptographically. This ensures that encryption and
integrity protection are provided end-to-end between the client and the intended
server, and eliminates the possibility to perform certain types of attacks.

Authentication

In order for the cryptographic authentication to work, the client must know
the server's public key so that it can securely authenticate the server. The
public key of the server has to be distributed to each client. For user
authentication SSH Tectia has different types of methods. These authentication
methods can be combined or used separately, depending on the level of
functionality and security you want. User authentication methods used by the
client by default are GSSAPI, public-key, keyboard-interactive, and password
authentication. Public-key and certificate authentication are combined into the
public-key authentication method. To provide secure file transfers, it has a SSH
Tectia file transfer client which is a FTP look like application. It can work
with any versions of SSH tectia Server.

Advertisment
SSH Tectia uses many different kinds of authentication methods to ensure that it provides a secure connection

User application protection

It also has an application called SSH Tectia Connector, which can be used to
protect user applications that use TCP as the transport protocol. However,
applications that start as a system service before the user is logged on to the
workstation or those that use UDP cannot be secured with SSH Tectia Connector.
SSH Tectia Connector is a transparent end-user client that provides dynamic
tunneling of client/server connections witho ut the need to re-configure the
tunneled applications. It starts automatically when the user logs on to a
Windows workstation.

It works silently in the background, protecting network
connections according to the security policies. It can also be used for
application protection using its static application tunneling features. All
that's required is to configure the application to connect to a local port
running SSH Tectia Client, and then the Client can be used to tunnel the
application to a specified remote host.

Advertisment

Setup

You can install Tectia on a Windows Server 2003 box from this month's
PCQEnterprise CD. After installation, run the SSH Tectia Configuration tool from
the Programs menu.

Cryptographic keys

Configure the maximum number of connections to Tectia Server from the
General tab. You can additionally enable the FIPS mode (FIPS 140-2) by checking
that option. You also need to add the host keys (public and private) and
certificates. Do this from the Identity page. You can also generate your own
2048 bit DSA key pairs from the same screen. The

default keys provided with Tectia are located in the installation directory
(C:\Program Files\SSHCommunications Security\SSHTectia\SSH Tectia Server).

Network interfaces

Now we need to configure the network interfaces. Use the Network tab for
this and add as many interfaces as you want Tectia to listen on. If you have
only one Network interface in your server, you do not need to specify the IP
addresses here.

Advertisment

Connections and Encryption

To configure the connections and encryption used in these connections, use
the Connections and Encryption tab and create new connections. Here, you can add
the interfaces to be used for the connection (setup from the Network tab).

Also configure the ciphers and MACs that will be allowed
for each connection. Here you will see something called 'Rkey Interval'
which is the number of seconds or transferred bytes after which the key exchange
will be done again. If values for both seconds and bytes are specified, rekeying
is done whenever one of the values is reached (first one to be reached). You can
customize this value, by default is 3600 seconds and 1 GB.

If you want to turn off the Rekey requests just enter a
zero as the value. But this will not prevent the client from requesting rekeys.
Select the ciphers and MACs from the Encryption tab as you require.

Advertisment

Authentication rules

New authentication rules can be added. There are two sub-pages for this to
be setup. You can use the Selectors tab to add the interfaces for which rules
are being created. You must define here if authentication is allowed or denied.
Next, use the parameters tab to configure the settings for each rule. There is a
choice between using password authentication or public-key authentication or
host-based authentication.

The client

Once the server is configured, you will have to configure the client in a
similar

fashion. On the client you can create multiple profiles for different servers if
you are using different method of authentication for every server.

To start using the SSH Tectia Server, open the SSH Tectia
Client, and click on the Quick Connect button. Provide the hostname, username
and the port number where the

Advertisment

Tectia server is running and click on Connect. Or if you
have created a profile, just click on that profile from the profile menu and it
will automatically connect you to the server. Similarly, you can use the File
Transfer SSH Tectia Client to transfer files in a secure way.

Swapnil Arora

Advertisment

Stay connected with us through our social media channels for the latest updates and news!

Follow us: