hello friends! new(ish)!

SSH: Difference between revisions

From InstallGentoo Wiki v2
Jump to navigation Jump to search
>Moistcake
No edit summary
>Tinfoil-hat
No edit summary
 
(11 intermediate revisions by 6 users not shown)
Line 1: Line 1:
[[File:SSH.gif|thumb|400px|right|SSH: Making unsafe networks safer since 1995.]]
[[File:SSH.gif|thumb|400px|right|SSH: Making unsafe networks safer since 1995.]]
SSH ('''S'''ecure '''Sh'''ell) is a network protocol that allows secure communications between two devices. What that means for the average /g/entleman is that you can run SSH on a server and then securely log in to your server anywhere when properly configured. In simpler terms, you can run your server via command-line anywhere. You can also browse the internet with your server's connection, effectively bypassing the filters many underageb& have on their school networks. SSH is free software with utilities on all major operating systems.
SSH ('''S'''ecure '''Sh'''ell) is a network protocol that allows secure communications between two devices. What that means for the average /g/entleman is that you can run SSH on a server and then securely log in to your server anywhere when properly configured. In simpler terms, you can run your server via command-line anywhere. You can also browse the internet with your server's connection, effectively bypassing the filters many underageb& have on their school networks. SSH is free software with utilities on all major operating systems.
==Setting Up an SSH Server==
===On Windows===
*Download [http://cygwin.com/install.html Cygwin]
*Choose "Install From Internet"
*Choose a mirror to download from
*When you get to the "Select Packages" screen, search SSH
*Choose to install the "Bin" version of the "openssh" package
*Download all dependencies and wait for setup to complete
*Open Cygwin and wait for the initial setup to complete
*Type "ssh-host-config" without the quotes
*Say yes when you get asked about privilege separation
*Say yes when asked to create a local user named sshd
*Say yes when asked to install sshd as a service
*When you see "CYGWIN=", type "ntsec tty" without the quotes ([http://www.chinese-watercolor.com/LRP/printsrv/cygwin-sshd.html this guide]explains why)
*You should be done now setting up the SSH server. To start it, type "net start sshd" without the quotes.
If you see:
The CYGWIN sshd service is starting.
The CYGWIN sshd service was started successfully.
Then everything went correctly. If not, you should Google the error.
===On OSX===
Simply go into sharing permissions and enable fucking everything.
===GNU or BSD based systems:===
1. You usually enable the ssh server during the installation. if possible do this, it is the simplest way of ssh'ing.
2. If you did not setup sshd to auto start you can type /etc/rc.d sshd start
3. If that does not work you need to install sshd, it will be in your package manager.
for Debian, and Debian based distros simply type '''apt-get install ssh.'''
===Post-Setup===
*Forward port 22 to the server ([http://portforward.com/ Here's a guide if you don't know how])
*OPTIONAL: Assign the server an address, so you can type ''server.com'' instead of XXX.XXX.XXX.XXX ([http://lifehacker.com/software/web-publishing/geek-to-live--how-to-assign-a-domain-name-to-your-home-web-server-124804.php Read this])
==Connecting to an SSH Server==
==Connecting to an SSH Server==
===Windows===
===Windows===
====The Easy Way====
====The Easy Way====
*Download [http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html PuTTY] or Firessh
*Download [https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html PuTTY] or Firessh
*Type the IP address of the server and choose "SSH" as the connection type. Type the external IP address, not the internal IP address (To find the external IP address, [http://whatismyip.com click here])
*Type the IP address of the server and choose "SSH" as the connection type. Type the external IP address, not the internal IP address (To find the external IP address, [http://whatismyip.com click here])
*Agree to add the host key and login with a username + password from the server (I.E., a Windows account, OSX account, etc.). That's it, you're SSHing!
*Agree to add the host key and login with a username + [[Passwords | password]] from the server (I.E., a Windows account, OSX account, etc.). That's it, you're SSHing!


====The Hard Way====
====The Hard Way====
Line 55: Line 13:
*Type your password in. That's it, you're SSHing!
*Type your password in. That's it, you're SSHing!
NOTE: This is also how you SSH into a server in OSX and Linux. Replace Cygwin with Terminal and the commands work the same.
NOTE: This is also how you SSH into a server in OSX and Linux. Replace Cygwin with Terminal and the commands work the same.
===GNU/Linux and UNIX===
*[http://www.openssh.org/manual.html Read the fucking manual.]
*For setting up your own SSH server on GNU/Linux or *BSD, check the [[Setting up a Server|local article on doing so securely]].  Virtually no modern distro ships without an SSH client.  [[RTFM|Check your distribution's documentation.]]
*If your distro starts an ssh daemon by default, it's an insecure piece of shit.
==What Can I Do?==
==What Can I Do?==
*Browse the server via command-line (I hope you know UNIX shell commands)
*Browse the server via command-line (I hope you know UNIX shell commands)
Line 60: Line 24:
*Browse using the server's internet ([http://lifehacker.com/237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy Read this]) (If you connect via PuTTY, an easier way is Connections>SSH>Tunnels. Check "Dynamic" and pick a port. Now follow the guide.)
*Browse using the server's internet ([http://lifehacker.com/237227/geek-to-live--encrypt-your-web-browsing-session-with-an-ssh-socks-proxy Read this]) (If you connect via PuTTY, an easier way is Connections>SSH>Tunnels. Check "Dynamic" and pick a port. Now follow the guide.)
*Other stuff that I don't know.
*Other stuff that I don't know.
==Generating an SSH key pair for easy and secure login==
Instead of using a password to login to remote systems, you can also use a key pair.
It works by generating a public and a private key, optionally protected by a strong passphrase. You then place the public key on the remote system, the private key is stored somewhere safe, where unauthorized people can't access it.
See the following link on how to generate an SSH key pair:
[https://www.ssh.com/ssh/keygen/ How to use ssh-keygen to generate a new SSH key | SSH.COM]
==Advanced Usage==
===SSH Tunnel===
SSH-Tunnel Syntax:
ssh -L [bind_address:]port:host:port user@server
ssh -R [bind_address:]port:host:port user@server
the option -L creates a local, and the Option -R a remote Port Forwarding. The encrypted tunnel is created always between Client and Server. The connection from "tunnel end" to host happens unencrypted, this is why you set it in most cases to localhost. Therefore localhost should not be confused with the local Computer. You have to see this localhost from server perspective, so the Server itself.
Die Option -L bzw. -R sets the direction. if you choose -L the direction is from your own Computer to the remote one, if you choose -R in the opposite direction. (you can think of it as normaL backwaRds.)
The first Port Argument is the entryport in the connection. You have to keep in mind, that the opening of a "privileged" port, so under 1024, only is allowed by root, so you should choose a higher one.
With the optional parameter bind_address you can seon which specific network address the connection should use, whereas localhost is default. A * or an empty bind_address-argument before the colon means, that the forwarding is on all Interfaces / Network Adresses. Probably whis will only work with IPv4 Adresses because the IPv6-Adresses aren't capable of beeing forwarded, Therefore you should use the Argument -4 .
The second port-parameter tells which Port tells, which port from host the tunneling should go on
Another useful argument is the option -N, which refuses a terminal-session, if you only want to use the Portforwarding to the remote systeme.
<b> Examples</b>
Forwarding fro Port 8000 on the local system to the Webserver (port 80) on Server:
ssh -L 8000:localhost:80 server -N &
netstat -anp --inet | egrep '(^Proto|8000)'
Proto Recv-Q Send-Q Local Address          Foreign Address        State      PID/Program name
tcp        0      0 127.0.0.1:8000          0.0.0.0:*              LISTEN    10843/ssh
fg
ssh -L 8000:localhost:80 server -N
[Strg-C]
Killed by signal 2.
Same, but it isn't just a connection from local Host forwarded, but from all Interfaces (hint: you need to set the option - GatewayPorts ; use this option with caution!):
ssh -L *:8000:localhost:80 server -N -4 &
netstat -anp --inet | egrep '(^Proto|8000)'
Proto Recv-Q Send-Q Local Address          Foreign Address        State      PID/Program name
tcp        0      0 0.0.0.0:8000            0.0.0.0:*              LISTEN    10906/ssh
Reverse direction. You allow Users on the Server, via localhost:3306 to connect to the clients MySQL-Server:
ssh -R 3306:localhost:3306 server
Last login: Sat Mar 11 23:24:20 2006 from 192.168.4.56
netstat -an --inet | egrep '(^Proto|3306)'
Proto Recv-Q Send-Q Local Address          Foreign Address        State
tcp        0      0 127.0.0.1:3306          0.0.0.0:*              LISTEN
exit
logout
Connection to server closed.
Here you can see an example of a double SSH Reverse tunnel:
needsupportpc$ ssh -R 22:localhost:2222 user@vps
helpdeskpc$ ssh user@vps -t ssh needsupportpcuser@localhost:2222
==Conclusion==
==Conclusion==
Any /g/entleman who can leave a computer running 24/7 has no reason not to run an SSH server. Honestly, even some junk box will work just fine, no need to leave a gaming rig on to SSH.
Any /g/entleman who can leave a computer running 24/7 has no reason not to run an SSH server. Honestly, even some junk box will work just fine, no need to leave a gaming rig on to SSH.
[[Category:Software]]
[[Category:Terms]]
[[Category:Networking]]
[[Category:GNU/Linux]]

Latest revision as of 08:40, 20 July 2020

SSH: Making unsafe networks safer since 1995.

SSH (Secure Shell) is a network protocol that allows secure communications between two devices. What that means for the average /g/entleman is that you can run SSH on a server and then securely log in to your server anywhere when properly configured. In simpler terms, you can run your server via command-line anywhere. You can also browse the internet with your server's connection, effectively bypassing the filters many underageb& have on their school networks. SSH is free software with utilities on all major operating systems.

Connecting to an SSH Server

Windows

The Easy Way

  • Download PuTTY or Firessh
  • Type the IP address of the server and choose "SSH" as the connection type. Type the external IP address, not the internal IP address (To find the external IP address, click here)
  • Agree to add the host key and login with a username + password from the server (I.E., a Windows account, OSX account, etc.). That's it, you're SSHing!

The Hard Way

  • Open Cygwin
  • Type "ssh <ipaddress or domain name> -l <username>" without the quotes
  • Type your password in. That's it, you're SSHing!

NOTE: This is also how you SSH into a server in OSX and Linux. Replace Cygwin with Terminal and the commands work the same.

GNU/Linux and UNIX

What Can I Do?

  • Browse the server via command-line (I hope you know UNIX shell commands)
  • Transfer files between the client and the server (You can use SSH, but there are better tools for the job)
  • Browse using the server's internet (Read this) (If you connect via PuTTY, an easier way is Connections>SSH>Tunnels. Check "Dynamic" and pick a port. Now follow the guide.)
  • Other stuff that I don't know.

Generating an SSH key pair for easy and secure login

Instead of using a password to login to remote systems, you can also use a key pair.

It works by generating a public and a private key, optionally protected by a strong passphrase. You then place the public key on the remote system, the private key is stored somewhere safe, where unauthorized people can't access it.

See the following link on how to generate an SSH key pair:

How to use ssh-keygen to generate a new SSH key | SSH.COM

Advanced Usage

SSH Tunnel

SSH-Tunnel Syntax:

ssh -L [bind_address:]port:host:port user@server
ssh -R [bind_address:]port:host:port user@server 

the option -L creates a local, and the Option -R a remote Port Forwarding. The encrypted tunnel is created always between Client and Server. The connection from "tunnel end" to host happens unencrypted, this is why you set it in most cases to localhost. Therefore localhost should not be confused with the local Computer. You have to see this localhost from server perspective, so the Server itself.

Die Option -L bzw. -R sets the direction. if you choose -L the direction is from your own Computer to the remote one, if you choose -R in the opposite direction. (you can think of it as normaL backwaRds.)

The first Port Argument is the entryport in the connection. You have to keep in mind, that the opening of a "privileged" port, so under 1024, only is allowed by root, so you should choose a higher one.

With the optional parameter bind_address you can seon which specific network address the connection should use, whereas localhost is default. A * or an empty bind_address-argument before the colon means, that the forwarding is on all Interfaces / Network Adresses. Probably whis will only work with IPv4 Adresses because the IPv6-Adresses aren't capable of beeing forwarded, Therefore you should use the Argument -4 .

The second port-parameter tells which Port tells, which port from host the tunneling should go on

Another useful argument is the option -N, which refuses a terminal-session, if you only want to use the Portforwarding to the remote systeme.

Examples

Forwarding fro Port 8000 on the local system to the Webserver (port 80) on Server:

ssh -L 8000:localhost:80 server -N &
netstat -anp --inet | egrep '(^Proto|8000)' 

Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 127.0.0.1:8000          0.0.0.0:*               LISTEN     10843/ssh

fg 

ssh -L 8000:localhost:80 server -N
[Strg-C]
Killed by signal 2.

Same, but it isn't just a connection from local Host forwarded, but from all Interfaces (hint: you need to set the option - GatewayPorts ; use this option with caution!):

ssh -L *:8000:localhost:80 server -N -4 &
netstat -anp --inet | egrep '(^Proto|8000)' 

Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 0.0.0.0:8000            0.0.0.0:*               LISTEN     10906/ssh

Reverse direction. You allow Users on the Server, via localhost:3306 to connect to the clients MySQL-Server:

ssh -R 3306:localhost:3306 server 

Last login: Sat Mar 11 23:24:20 2006 from 192.168.4.56
netstat -an --inet | egrep '(^Proto|3306)'
Proto Recv-Q Send-Q Local Address           Foreign Address         State
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN
exit
logout
Connection to server closed.

Here you can see an example of a double SSH Reverse tunnel:

needsupportpc$ ssh -R 22:localhost:2222 user@vps
helpdeskpc$ ssh user@vps -t ssh needsupportpcuser@localhost:2222

Conclusion

Any /g/entleman who can leave a computer running 24/7 has no reason not to run an SSH server. Honestly, even some junk box will work just fine, no need to leave a gaming rig on to SSH.