Managing servers with DSSH



Similar documents
SOA Software API Gateway Appliance 7.1.x Administration Guide

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction

Dragonframe License Manager User Guide Version 1.2.2

AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts

Managing the System Event Log

Get Success in Passing Your Certification Exam at first attempt!

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

A Guide to New Features in Propalms OneGate 4.0

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Creating a DUO MFA Service in AWS

MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative

Upgrading a Single Node Cisco UCS Director Express, page 2. Supported Upgrade Paths to Cisco UCS Director Express for Big Data, Release 2.

WestermoConnect User Guide. VPNeFree Service

File Transfer Examples. Running commands on other computers and transferring files between computers

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

Extending Remote Desktop for Large Installations. Distributed Package Installs

CDH installation & Application Test Report

Phone Inventory 1.0 (1000) Installation and Administration Guide

DIGIPASS Authentication for Cisco ASA 5500 Series

Cloud Storage Quick Start Guide

Configure Backup Server for Cisco Unified Communications Manager

ANS Monitoring as a Service. Customer requirements

SSL VPN User Guide Access Manager 3.1 SP5 January 2013

How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950

Managing the System Event Log

Remote PC Guide for Standalone PC Implementation

An Oracle White Paper September Oracle WebLogic Server 12c on Microsoft Windows Azure

Configure and enable remote access for windows operating system

ISERink Installation Guide

HIPAA Compliance Use Case

How To - Implement Clientless Single Sign On Authentication with Active Directory

Kwickserver Firewall. Overwiew. Features. Two distinct internal networks. Portfilter. Documentation Version 1.1. Peter Buzanits

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

OnCommand Performance Manager 1.1

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

Configuring Global Protect SSL VPN with a user-defined port

LDAP User Guide PowerSchool Premier 5.1 Student Information System

Managing the System Event Log

Equalizer VLB Beta I. Copyright 2008 Equalizer VLB Beta I 1 Coyote Point Systems Inc.

Remote Unix Lab Environment (RULE)

Nixu SNS Security White Paper May 2007 Version 1.2

Providing Credentials

Setup Guide for Magento and BlueSnap

/ Preparing to Manage a VMware Environment Page 1

Configuring SSH and Telnet

Hadoop Data Warehouse Manual

Viking VPN Guide Linux/UNIX

How to Tunnel Remote Desktop Through SSH on a Windows Computer

Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide

Using Virtual Machines

Configuring User Identification via Active Directory

Cisco ISE Command-Line Interface

CA Performance Center

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

Decision Support System to MODEM communications

How Reflection Software Facilitates PCI DSS Compliance

Recommended File System Ownership and Privileges

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

IGEL Universal Management. Installation Guide

How to Configure an Initial Installation of the VMware ESXi Hypervisor

LDAP and Active Directory Guide

Using TU Eindhoven's VPN with Ubuntu 14.04

Campus VPN. Version 1.0 September 22, 2008

CASHNet Secure File Transfer Instructions

NetIQ Advanced Authentication Framework - MacOS Client

Integrating EJBCA and OpenSSO

McAfee SMC Installation Guide 5.7. Security Management Center

EMR Link Server Interface Installation

Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. ID: My Blog:

PingFederate. Identity Menu Builder. User Guide. Version 1.0

HPCC - Hrothgar Getting Started User Guide

Managing Qualys Scanners

CafePilot has 3 components: the Client, Server and Service Request Monitor (or SRM for short).

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

EMC VoyenceControl Integration Module. BMC Atrium Configuration Management Data Base (CMDB) Guide. version P/N REV A01

Non-Employee VPN Quick Start Guide

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Lab Developing ACLs to Implement Firewall Rule Sets

Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08

Installing a Symantec Backup Exec Agent on a SnapScale Cluster X2 Node or SnapServer DX1 or DX2. Summary

HP Device Manager 4.7

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

Linux Server Configuration Guidelines

Clustered Data ONTAP 8.3

Connecting an Android to a FortiGate with SSL VPN

Sophos UTM. Remote Access via PPTP Configuring Remote Client

Stealth OpenVPN and SSH Tunneling Over HTTPS

Author A.Kishore/Sachin VNC Background

SECURE FTP CONFIGURATION SETUP GUIDE

Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1

Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Clientless SSL VPN Users

Troubleshooting the Firewall Services Module

A SHORT INTRODUCTION TO BITNAMI WITH CLOUD & HEAT. Version

Big Data Operations Guide for Cloudera Manager v5.x Hadoop

Transcription:

Managing servers with DSSH 29. 11. 2010 Juraj Bednár

Introduction DIGMIA System administration and consulting company Most of the TOP 20 web sites in Slovakia are our customers Supporters of open-source Me Co-founder of Progressbar.sk hackerspace Member of Society for Open Information Technologies (soit.sk)

Who is this presentation for? At least 5 system administrators or At least 30 servers in heterogenous environment

Use case

Wrong solutions Use ssh agent forwarding Known to be insecure if you don't trust the server (which you should not it's customer's, their security policy applies) Create VPN to office Single point of failure Difficult to manage if there are different customers with same network range (192.168.x.x)?

Wrong solutions Cut & paste passwords Clipboard not safe enough You don't need to display passwords, just use them at just the right place (don't paste to chat...)

Not applicable for us pfexec, sudo,... Low auditability sudo -s copy file to server and then execute Management hell Can not create lots of unix accounts and manage them LDAP not possible (different customers, different security policies)

Enter DSSH Custom scriptable SSH client Written in Java, using modified Trilead SSH library Console initialization components written in JNI Needs terminal emulator (such as xterm or Terminal.app) Scriptable in BeanShell Used Groovy, but it was too slow (interactive start)

Features SSH in SSH tunneling Hostnames can be interpreted by script to login you to target network Possibility to change hostnames Possibility to login as root by using su or ena Limited scp support (sftp coming soon) Not possible to scp using su or ena because of server lim.

Additional features Dynamic path selection (script can ping several entry point hosts) Logging support Credentials storage very lightweight API does not support key retrieval (you can only use keys) Supports password retrieval Can be changed for any password storage solution easily

Architecture

Examples We don't want our admins to remember weird port numbers if ((host.equals("weirdhost.customer1")) && (port == 22)) port = 31337; Or IP addresses if (host.equals("weirdhost.customer2")) host = "192.146.122.211";

Examples Automatically use backup connection if (host.equals("weirdhost3.customer")) { InetAddress address = InetAddress.getByName(host); if (!address.isreachable(1500)) { if (verbose) System.err.println("Unable to connect to weirdhost3.customer, connecting to weirdhost3-1.customer instead"); host = "weirdhost3-1.customer"; }}

Examples Use jumpstation (SSH in SSH tunelling) if (host.equals("weirdhost5.customer")) { parent = getauthenticatedsshconnection(myuser, gw.customer, 22, parent, auth); } Additionaly you can create virtual hostnames by adding host = 192.168.2.3 ;

Examples Security policy denies direct root logins In getauthenticatedsshconnection() if (host.equals("weirdhost.customer4") && user.equals("root")) user = "digmia"; In getinteractivesession() if (host.equals("weirdhost.customer4") && user.equals("root") return new InteractiveSuSession(conn.openSession(), host, username, pass);

Examples Collect configurations from Cisco routers for i in `cat dsshhostlist-cisco` do echo "Downloading configuration from $i" echo term len 0 $'\n' sh run $'\n' exit /usr/local/bin/dssh -k cisco/known_hosts ena@$i sed -n '/^[!]/,/^end/p' > cisco/$i done

Documentation and license Currently GPLv2 We consider to switching to less strict license (BSD) Documentation with examples available online Download at http://opensource.digmia.com/

Future Creating DSSH server Standalone mode still possible Lightweight client (possibly in Python) Faster start-up times Very little actual functionality Possible to quickly steal terminal emulation from Putty and allow xterm - less Windows client SSL + certificates

Future Server allows additional features Client never sees credentials Server can check ACLs Revoke certificates (no need to change all passwords, although this is scriptable thanks to DSSH :) DSSH server side auditing DSSH server sees into connections (even forwarded ones) Logging of file transfers, port forwards, console,... Server can be clustered (very little state information, this is really easy)

Future Admins never see credentials No password leaks nor key leaks SSL certificates can be revoked and exchanged easily Admins sometimes have to see credentials anyway (console root login to broken server) Portal to request password and provide explanation Automatically creates ticket to change password in trouble ticketing system SOCKS proxy -D (currently supports only -L a -R port forwarding)

Future Central server key authority known_hosts idea is a main failure Key never just changes, someone has to approve Configurable policy, that does not ask the administrator, but just drops the connection

New architecture

Questions? Working on it right now Q1-Q2 2011 You can help and shape the future of DSSH! Questions? (and possibly some answers)