wiki:NspwUprouse/Agenda/ssh

Version 4 (modified by admin, 3 years ago) ( diff )

--

Secure SHell (SSL)

In this lab we are using your host machine as the ssh client and your Ubuntu VM as the ssh server. Download following applications

  • PuTTY (the Telnet and SSH client itself)
  • PuTTYgen (an RSA and DSA key generation utility

Setting up virtualbox

Installation of VirtualBox and Downloading Ubuntu iso image

  • Download and install VirtualBox
  • Download Ubuntu image from here
  • Note down the location of the downloaded iso file

Creating the VM

  • Start virtualbox and Click on New button to create new virtual machine
  • Enter name of the VM as: Ubuntu.
  • Select OS Type: Linux
  • Select Version: Ubuntu (64-bit)
  • Then click on Continue button
  • Set VM's memory size to 1024MB and click on Continue button
  • Set VM's hard disk option to Create a virtual hard disk now and then click on Continue
  • Select disk type to VDI
  • Select storage type to Fixed size and Continue
  • Make sure virtual hard disk file name in following format Ubuntu
  • adjust the disk size to 12.0GB and click on Create to create the VM

This might take a couple of minutes

(Note down the location of vdi image file when VirtualBox flashes it on the screen)

Setting up Network Interface

  • Select the VM from the left panel on Virtual box, right-click and open Settings
  • Click on the Network title
  • On Adapter 1 While Enable Network Adapter selected choose Attached to be Bride Adapter.

Setting up boot device and Booting

  • Click on Storage title and select CD ROM icon with Caption "Empty" under the Controller:IDE, Click on CD ROM icon under the Attribute on the left side to select
  • Select Choose a disk file
  • Locate the Ubuntu CD Image file you downloaded. Press OK to close the settings window.
  • Right-click on VM and select Start to make a Normal Start. You should now see a separate window with Installation screen"

Installation

Installation is quite simple. You can figure it out yourself but make sure to select OpenSSH server when it asks.

Password-Based Authentication

  • Go to your host machine.
  • Start PuTTY utility, by double-clicking on its .exe file.
  • In the Host Name field, enter the IP address/Hostname of ssh server

https://ws.learn.ac.lk/raw-attachment/wiki/netsec2018ssh/putty.png

  • Click open.
  • It will ask for a username followed by a password.
  • Logout/close this session.

Public Key Authentication

Generating OpenSSH-compatible Keys for Use with PuTTY

To generate a set of RSA keys with PuTTYgen

  • Start the PuTTYgen utility, by double-clicking on its .exe file.
  • For the type of key to generate, select SSH-2 RSA
  • In the Number of bits in a generated key field, specify either 2048 or 4096 (increasing the bits makes it harder to crack the key by brute-force methods).
  • Click the Generate button.

https://ws.learn.ac.lk/raw-attachment/wiki/netsec2018ssh/puttygen.png

  • Move your mouse pointer around in the blank area of the Key section, below the progress bar (to generate some randomness) until the progress bar is full.

https://ws.learn.ac.lk/raw-attachment/wiki/netsec2018ssh/puttygen1.png

  • A private/ public key pair has now been generated.
  • In the Key comment field, enter your email address.
  • The Key passphrase field & re-type the same passphrase in the Confirm passphrase field. Click the Save private key button and save as private_key .
  • Right-click in the text field labeled Public key for pasting into OpenSSH authorized_keys file and choose Select All.

https://ws.learn.ac.lk/raw-attachment/wiki/netsec2018ssh/puttygen2.png

  • Right-click again in the same text field and choose Copy.
  • Open notepad; paste the public key and save it as txt file.

Save The Public Key On The Server

Now, you need to paste the copied public key in the file ~/.ssh/authorized_keys on your server.

  • Log in to your destination server using putty with your username
  • If your SSH folder does not yet exist, create it manually
    mkdir ~/.ssh
    chmod 0700 ~/.ssh
    touch ~/.ssh/authorized_keys
    chmod 0644 ~/.ssh/authorized_keys
    
  • Paste the SSH public key into your ~/.ssh/authorized_keys file:
    sudo vi ~/.ssh/authorized_keys
    
  • Tap the i key on your keyboard & right-click your mouse to paste.
  • To save, tap the following keys on your keyboard (in this order): Esc, :wq Enter.

Create a PuTTY Profile to Save Your Server’s Settings

In PuTTY, you can create (and save) profiles for connections to your various SSH servers, so you don't have to remember, and continually re-type, redundant information.

  • Start PuTTY by double-clicking its executable file.
  • PuTTY's initial window is the Session Category (navigate PuTTY's various categories, along the left-hand side of the window).
  • In the Host Name field, enter the IP address/Hostname of the ssh server
  • Enter the port number in the Port field as 22
  • Along the left-hand side of the window, select Connection > SSH > Auth

https://ws.learn.ac.lk/raw-attachment/wiki/netsec2018ssh/puttyauth.png

  • Browse your file system and select your previously created private key.
  • Return to the Session Category and enter a name for this profile in the Saved Sessions field.
  • Click the Save button for the Load, Save or Delete a stored session area.

Now you can go ahead and log in and you will not be prompted for a password. However, if you had set a passphrase on your public key, you will be asked to enter the passphrase at that time (and every time you log in, in the future).

Two Factor Authenticating

We will enable two-factor authentication in our ubuntu server. To implement that we are going to use multifactor authentication with Google Authenticator.

Google auhtenticator

  • Install Google Authenticator from following link in your Android device/iPhone/iPad/BlackBerry/Firefox devices
    https://support.google.com/accounts/answer/1066447?hl=en
    
  • Follow the instruction and install the app on your mobile.
  • Or you can search for google-authenticator in Google Play or Apple Store.

Create an Authentication Key

  • Go to the Ubuntu VM
  • Install google-authenticator module first:
    sudo apt-get update
    sudo apt-get install libpam-google-authenticator
    
  • Log in as the user you’ll be logging in with remotely and run the google-authenticator command to create a secret key for that user.
    $ google-authenticator
    
    Do you want authentication tokens to be time-based (y/n) y
    
  • You will get some QR code ouput like bellow:

https://ws.learn.ac.lk/raw-attachment/wiki/netsec2018ssh/qr.png

You will be prompted for some configurations.

  • Scan the QRcode that appears with the Google Authenticator app or you can add the secret key Google Authenticator app.
  • Save the backup codes listed somewhere safe. They will allow you to regain access if you lose your phone with the Authenticator app.
  • Next, it will ask several questions; . Just enter "y" for them.
    Do you want me to update your "/home/myuser/.google_authenticator" file (y/n)
    
    Do you want to disallow multiple uses of the same authentication
    token? This restricts you to one login about every 30s, but it increases
    your chances to notice or even prevent man-in-the-middle attacks (y/n)
    
    By default, tokens are good for 30 seconds and in order to compensate for
    possible time-skew between the client and the server, we allow an extra
    token before and after the current time. If you experience problems with poor
    time synchronization, you can increase the window from its default
    size of 1:30min to about 4min. Do you want to do so (y/n)
    
    If the computer that you are logging into isn't hardened against brute-force
    login attempts, you can enable rate-limiting for the authentication module.
    By default, this limits attackers to no more than 3 login attempts every 30s.
    Do you want to enable rate-limiting (y/n)
    

Enable two factor authentication for SSH

  • Edit the /etc/pam.d/sshd file
    sudo vi /etc/pam.d/sshd
    
  • Add the following line to the bottom:
    auth required pam_google_authenticator.so nullok
    auth required pam_permit.so
    
  • :wq Save and quit.
  • Edit /etc/ssh/sshd_config file
    sudo vi /etc/ssh/sshd_config
    
  • Search for ChallengeResponseAuthentication and replace no with yes
    ChallengeResponseAuthentication yes
    
  • :wq Save and quit.
  • Now you need to reload the ssh service. You can do it to way:
    sudo service ssh restart
    

Testing

Try to ssh to the server from another terminal. It will ask for the verification code.

If this does not work, it means you have still enabled only one authentication.

Edit the /etc/pam.d/sshd file again add the following line to the end.

AuthenticationMethods publickey,password publickey,keyboard-interactive

Now restart the ssh service and try again to log in from a different terminal.

This will enable three authentication modes, i.e. your public Key, Password, and OTP.

If you need to disable your password, find the following line on /etc/pam.d/sshd and comment the line by using a #.

@include common-auth

Note

If you are a MAC OS or Linux GUI user, you may try https://www.informaticar.net/configure-passwordless-ssh-login-in-linux/ for two way authenticated SSH.

Note: See TracWiki for help on using the wiki.