Experimental Techniques 8



Similar documents
Installing the SSH Client v3.2.2 For Microsoft Windows

Introductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols

AnzioWin FTP Dialog. AnzioWin version 15.0 and later

IIS, FTP Server and Windows

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

Access Instructions for United Stationers ECDB (ecommerce Database) 2.0

Connecting to the School of Computing Servers and Transferring Files

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX ] 1

MiraCosta College now offers two ways to access your student virtual desktop.

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

Installing Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.

Uploading files to a web server using SSH Secure Shell 3.2.9

SSH! Keep it secret. Keep it safe

Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08

Lab 8: Configuring Backups

Using SSH Secure Shell Client for FTP

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC

Install FileZilla Client. Connecting to an FTP server

Install and configure SSH server

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

Export & Backup Guide

Quick Start Guide. Hosting Your Domain

Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to IROC RI

OpenVPN over SSH tunneling

Sysax Multi Server User manual

User Guide Trust Safety Accounting Upload PC Law and SFTP Software Release: Final Date

UW Computer Science and Engineering Starting UNIX X Clients From Windows XP. revised September Warren Jessop

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

How to Bypass Your Corporate Firewall Using SSH Tunneling

FTP Server Application Guide. Rev:

Secure Shell. The Protocol

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.

SSH and Basic Commands

Using Internet or Windows Explorer to Upload Your Site

MATLAB on EC2 Instructions Guide

FTP Server Application Guide

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

NAS 109 Using NAS with Linux

SFTP Server User Login Instructions. Open Internet explorer and enter the following url:

Please note that a username and password will be made available upon request. These are necessary to transfer files.

How to install and set up the WinSCP software for Secure File Transfer

If you have questions or find errors in the guide, please, contact us under the following address:

Safety and Health Grant Program Database Remote Access Installation Guide

File Transfer with Secure FTP

Configuring for SFTP March 2013

Livezilla How to Install on Shared Hosting By: Jon Manning

TS-800. Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.

Connecting to the Hospira FTP Server

Managing the System Event Log

Getting Started With Your Virtual Dedicated Server. Getting Started Guide

User Guide Microsoft Exchange Remote Test Instructions

Securing Windows Remote Desktop with CopSSH

Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Accessing the FTP Server - User Manual

Mapping the ITS File Server Folders to Mosaic Windows

Xopero Backup Build your private cloud backup environment. Getting started

Lab 8.3.3b Configuring a Remote Router Using SSH

Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas

Laboration 3 - Administration

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

User Guide Version 3.0

CASHNet Secure File Transfer Instructions

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

enter the administrator user name and password for that domain.

Connectivity using ssh, rsync & vsftpd

HPCC - Hrothgar Getting Started User Guide

Remote Access: Citrix Client Setup

ilaw Installation Procedure

Securing Windows Remote Desktop with CopSSH

GUIDANCE ON ACCESSING THE HOUSTON METRO SECURE FTP SITE FOR DOCUMENT MANAGEMENT

Parallels. for your Linux or Windows Server. Small Business Panel. Getting Started Guide. Parallels Small Business Panel // Linux & Windows Server

Upgrade your Software

Lab Configure Basic AP Security through IOS CLI

Access your directories (home directory and shared directories) outside Tilburg University

FTP Over SSL (FTPS) Core FTP LE. Installing Core FTP LE"

EventTracker Windows syslog User Guide

Installing the Microsoft Network Driver Interface

Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1

Moxa Device Manager 2.0 User s Guide

Managing the System Event Log

Hyper-V Server 2008 Setup and Configuration Tool Guide

Introduction to Operating Systems

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

Host your websites. The process to host a single website is different from having multiple sites.

Using WinSCP to Transfer Data with Florida SHOTS

ReadyNAS Remote Troubleshooting Guide NETGEAR

Active Directory integration with CloudByte ElastiStor

Hallpass Instructions for Connecting to Mac with a Mac

F-SECURE MESSAGING SECURITY GATEWAY

Creating a Website with MS Publisher

PTC X/Server. Evaluation Guide. PTC Inc.

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Global TAC Secure FTP Site Customer User Guide

Using the Secure District File Retrieval System to Access 2008 AYP Accountability Reports

Backup & Restore Guide

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

WinSCP for Windows: Using SFTP to upload files to a server

Transcription:

Experimental Techniques 8 Remotely Logging into a Linux Workstation JinJie Jiang, Ph.D, Ralph T. Weber, Ph.D. Bruker BioSpin Corporation EPR Division 19 Fortune Drive Billerica, MA USA 1. Introduction The Linux workstation delivered with your Elexsys EPR spectrometer offers you several options to login remotely or transfer files. The most commonly-used tools have been Telnet or rlogin for remote login and FTP or rcp for data transfer. Computer experts discourage the use of these tools because they do not offer the security required to protect your system and information from mischief. For this reason, many versions of Red Hat Linux disable FTP and Telnet by default. We encourage using alternative tools such as SSH (Secure SHell) and SFTP (Secure FTP) that give you similar functionality with added security. This note describes SSH and SFTP from either a Linux or MS Windows platform. It also describes how to activate and heighten the security of your Linux workstation should you still choose to use FTP and Telnet. 2. SSH, A Secured Way to Telnet 2.1. What is SSH? SSH (Secure SHell) is an internet protocol that allows a user to connect to a remote host via an encrypted link by: 1) an authentication process with a special key, and 2) encrypting information including passwords that may be intercepted by hackers. To use SSH you need: 1) an sshd daemon running on the server; 2) an SSH program on the client computer; 3) a user s account and password on the server. To check whether sshd is running on the server you can use the ps -ax grep sshd command on the server. If not, start the daemon by typing /usr/sbin/sshd (n.b. you must be root to use this command). The Red Hat Linux operating system provides an SSH program for both the server and client. For the SGI O2 IRIX operating system and MS Windows operating system, there are free and commercial SSH or SSH-like software available for client and server computers. Special regulations may apply to encryption software depending on your country. Make sure you do not violate these regulations. Experimental Techniques 8

SSH, A Secured Way to Telnet 2.2. SSH from a Linux workstation 2.3. SSH from MS Windows It is easy to use SSH to connect a computer with Red Hat Linux to a Red Hat Linux workstation since the sshd daemon is running by default. Simply open a shell window and type ssh <server s IP address> under the prompt sign. You can also use the server s hostname if it is listed in the client computer s /etc/hosts file or DNS (Domain Name Server) is available. You will be prompted for user account and password. The first time you try to connect to the remote host you will be asked whether the host is a trusted host. If your answer is Yes, a so-called magic key (authentication) will be generated for you and then you can proceed just as you would with Telnet. If you activated remote display by the command xhost + <host IP address> before you launch SSH, you can launch the Xepr program after you log in remotely. A Microsoft Windows operating system does not provide SSH support. You need to install an SSH program. Several web sites provide SSH software either for free or commercially. You can find them at: http://www.freessh.org. A particularly useful web site is http://www.openssh.com. It provides a free MS Windows -based client program called PuTTY that offers SSH connections. Read the instructions and manuals posted on the above web site before you install. 2

SSH, A Secured Way to Telnet Enter hostname or IP address Select SSH Name the session Figure 2-1 Configuring and launching PuTTY (SSH) from a MS Windows -based computer. Double click the putty.exe icon to launch the program. A configuration dialog window opens. (See Figure 2-1.) Enter the IP address or hostname of the SSH server, e.g. the Linux workstation. Select SSH as the protocol. You can give a session name and Save it so that you can Load it the next time. Click the Open button to start the connection. A DOS window opens prompting for a login account and password. Enter the user account name and password and you will be connected to the host. The first time you establish the connection you need to answer yes to the question of whether the remote host is a trusted host. Figure 2-2 Login to a remote host using the SSH program. Experimental Techniques 8 3

SFTP, A Secure Way to FTP 3. SFTP, A Secure Way to FTP 3.1. What is SFTP? Similar to SSH, SFTP (Secure FTP) is a secure means to transfer files. It utilizes SSH s authentication feature and encrypts the transactions. 3.2. SFTP from a Linux System To SFTP between computers with Linux operating systems you can simply enter sftp <IP address (or hostname)> in a shell window. The authentication and login process are the same as SSH. 3.3. SFTP from a MS Windows System You can find SFTP freeware for MS Windows -based systems from the web site: http://www.openssh.com/windows.html. Among these programs ixplore is particular convenient and easy to use since it has a graphical user interface. Download and install this software package onto your MS Window -based PC following the instructions on its web site. Launch the ixplore program. In the opened window, right-mouse-click SSH Hosts > New SSH Host. (See Figure 3-3.) Figure 3-3 Setting up a New SSH Host. 4

SFTP, A Secure Way to FTP A pop-up window of the Remote SSH Host Properties opens. In the Remote SSH Host Properties window enter the Host Display Name, Host (IP address or complete hostname), Username, and other optional information. Click OK. Figure 3-4 Entering Remote SSH Host Properties. Experimental Techniques 8 5

SFTP, A Secure Way to FTP You need to confirm that the remote host is a trusted host as part of the authentication process. You will not be able to type in the text box. Click the Yes button instead. You may need to scroll down to see the Yes button. Figure 3-5 Confirming the remote host. If your New SSH Host was configured properly you will be prompted for the password. Enter the password and click OK. Figure 3-6 Entering the password. 6

SFTP, A Secure Way to FTP Now you are logged in. From the window you can upload or download files or folders. The nice thing about this program is that you can drag and drop. Local site Remote site Figure 3-7 SFTP window After you finish the transaction you can log out by right clicking the remote host icon and then clicking Log Off. (See Figure 3-8.) Figure 3-8 Logout from the remote host. If you save this session you will find the icon in the SSH Hosts list. You can can click the icon and then Open to start an SFTP session or click Properties to modify the configurations. You can reestablish a connection to an SSH Experimental Techniques 8 7

What If I Still Want to Use Telnet or FTP? host, simply by clicking its icon to start an SFTP session. A right mouse click allows you to modify the settings. 4. What If I Still Want to Use Telnet or FTP? 4.1. How to activate Telnet and FTP 4.2. Make it a little safer It is not recommended that you increase the security by editing the hosts.allow and hosts.deny files since that might cause booting problem of the acquisition server. By default, Red Hat Linux (7.1 or above) disables Telnet and FTP. You can activate them in a server by modifying their configuration files. You need to be root to edit these files. Use a text editor to open the /etc/xinetd.d/telnet file. Find the entry disable = yes and change it to disable = no. Save the modified file. Edit the /etc/xinetd.d/wu-ftp file the same way. In a shell window enter service network restart. The new settings will then be active. You will be able to remotely login with Telnet or FTP. You can limit the Telnet and FTP services to trusted hosts only if you know their IP addresses. In the /etc/xinetd.d/telnet file add a line: only_from = <IP address(es)>. You can separate the IP addresses by a coma if there is more than one IP address. You can also enter a subnet address to allow all the hosts from this subnet to access the service. The format is <subnet address>/<number of bits for network and subnet>. For example, if you add only_from = 192.168.99.0/24, all 254 hosts in the subnet 192.168.99.0 can access your Telnet service. The number 24 indicates that 24 bits of the 32 bit IP address are used for the network/subnet address. If you change to only_from = 192.168.99.16/28 it means that the first 28 bits of the total 32 bits are used for network/subnet address. All 14 hosts from 192.168.99.17 to 192.168.99.30 of the subnet 192.168.99.16 are allowed to login remotely with Telnet. Ask your local network administrator for the subnet address and network mask if you plan to allow all your local subnet users to use Telnet. You can set the same restriction on FTP via the /etc/xinitd.d/wu-ftp file. 8

Glossary 5. Glossary rcp rlogin rsh ssh sshd ssh-agent ssh-add sftp scp ssh-keygen sftp-server ssh-keyscan Remote CoPy. Remote LOGIN. Remote SHell. Secure SHell, a basic rlogin/rsh-like client program. The ssh daemon that permits you to login. An authentication agent that can store private keys. Tool which adds keys to the above agent. FTP-like program that works over SSH1 and SSH2 protocols. Secure CoPy, a file copy program that acts like rcp. Key generation tool. SFTP server subsystem (started automatically by sshd in a Linux system). Utility for gathering public host keys from a number of hosts. Experimental Techniques 8 9

Notes 10