how ssh with a private key works sponsored by the national science foundation cloud security...

7
How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net

Upload: kerry-cooper

Post on 04-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015

How SSH With a Private Key

Works

Sponsored by the National Science Foundation

Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net

Page 2: How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015

SSH with a password

ssh

local> ssh [email protected]

[email protected]’s password:########Welcome to remote!jdoe@remote> exitlocal> ssh [email protected]@remote2.edu’s password:########

Hash of password stored on each remote machine

User enters passwordonce for each connection to each machine

*nix-based system (Windows behavior may vary)

Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net

Page 3: How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015

SSH with a private keylocal> ssh-add ~/.ssh/id_rsaEnter passphrase for ~/.ssh/id_rsa:########local> ssh [email protected]

Welcome to remote!jdoe@remote> exitlocal> ssh [email protected]

Welcome to remote2!jdoe@remote2> exitlocal> ssh [email protected]

Welcome to remote3!jdoe@remote3> exit

ssh

Public key is stored on each remote machine

User enters passphrase to unlock private key for all connections to all machine

Private key is stored only on local machine

*nix-based system (Windows behavior may vary)

Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net

Page 4: How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015

SSH with a private key is both easier to use and more secure

Sponsored by the National Science Foundation

Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net

Page 5: How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015

You should never be prompted for a password to log into a GENI compute node.

If you are, something has always gone wrong.

Sponsored by the National Science Foundation

Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net

Page 6: How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015

GENI Expiration and Renewal

Sponsored by the National Science Foundation

Cloud Security Curriculum Workshop – July 16, 2015 www.geni.net

Page 7: How SSH With a Private Key Works Sponsored by the National Science Foundation Cloud Security Curriculum Workshop – July 16, 2015

slice expiration time ≤ project expiration time

each resource expiration time ≤ slice expiration time

each resource expiration time ≤ aggregate’s max expiration

project

slice

resource

(optional)project

expiration timeslice

expiration timeresource

expiration timenow

To extend the lifetime of your resource reservation, you must renew the slice and all resources

resourceresource

Sponsored by the National Science Foundation Cloud Security Pedagogy Workshop – July 16, 2015