In this weeks under the hood episode, we will take look into something a lot of system admins and DevOps use almost daily and that is ‘SSH’ which stands for secure shell.
In case you missed the previous UTH episode where we discussed the ‘Fisher Yates’ algorithm, you can catch that here
What is SSH?
SSH as you may already know, is a network protocol used to establish a secure access to operate a remote machine, without being physically present. SSH first appearance was in the mid 1990’s, originally developed by Tatu Ylonen.
Up until it appearance, other services like Telnet, rlogin or RSH, where used to achieve this purpose. Although, they got quite a problem, i.e they transmits all information including usernames and passwords in plaintext, so it is not recommended for security-sensitive applications.
Anyone sniffing the network, would easily read all information including sensitive ones crystal clear.
This flaw, is what SSH aim to solve, a method to connect to a remote machine, where by all data going through the network is secured and encrypted.
We will look at all process involve in successfully establishing an SSH connection , and I will try my best to simplify what happens at each of these layers.
Initialization:
When you initialize an SSH connection with a SSH server, A three way (SYN, SYN-ACK, ACK) handshake occurs between the client and server to establish a TCP connection on port 22.
Handshake, if you’re not familiar with it, is a process by which the client and server ensures that both are ready for communication. In case of the three-way handshake - the client sends SYN (synchronization) with a packet containing a number X, then the server acknowledges (ACK) that, by responding with an increment X+1 and also it own synchronization (SYN) packet containing a number Y, by which the client acknowledges (ACK) that by sending over Y+1. Thus, completing the handshake (SYN, SYN-ACK, ACK)
Then, a version exchange occurs between the client and server, where they verify whether or not, they are able to communicate based on their version numbers, In case of any compatibility issues.
Algorithm negotiation.
Following the version exchange, both the client and server exchange list of their supported cryptographic algorithms, and then they agree on the algorithms to use, typically the first mutually supported algorithm from each list.
Key Exchange
In this step, both client and server securely generates a session key by using mostly Diffie Hellman algorithm.
The algorithm works very simple:
Keep in mind that “value” is some mathematical thingy.
- Initially both parties agree upon common value (mostly a large prime number), which is usually not needed to be secret, let say it the seed value.
- Then, they generate a secret value, that they don’t exchange with each other. (a private key)
- Both the seed value and the secret value are then combined together to generate a public key, and then exchanged over the network.
This can be done because, it will be very difficult to break it up into the exact values that created it. hence a third party doesn’t stand a chance.
- Then upon the client and server receiving each others resulting combinations, they both uses their private key, public key and the seed value to compute a shared secret.
I think one of the most simplified explanation and visual, will be that of the color mixing analogy:
Further learning Resources:
Authentication
After both devices have successfully establish a secure communication, authenticating the client will be required in other to provide access.
In SSH, authentication can be done with:
- Passwords
- private/public key mechanism
While passwords are very straightforward to understand. let skip that and look at the private/public key mechanism method.
Typically what you do is:
Generate an SSH key and copy that over to your ssh server.
Then, whenever you request to connect, the SSH does something like:
- The server encrypt some kind of message with your public key and sends it over.
- Your SSH client uses your private key to decrypt the challenge from the server.
- If the decryption is successful, it proves you possess the corresponding private key.
- The server can then verify if it was indeed it original message and allow you to connect.
Transport
After a successful authentication, SSH open up a new channel for back and forth transportation, which allows for different functionality like multiplexing, tunneling, port forwarding and so forth.
Every packet going through is encrypted, also a little bit of padding is added in there just for a little more extra security.
That’s it, an overview of SSH does under the wood to establish a connection between devices.
Super hoped you learned something new as I did.
What I’m currently working on:
devcanvas.art - an online frontend editor with super powers; fast preview, plugins and an amazing library of cool frontend creations for your inspiration and learning.
Try devcanvas @ devcanvas.art/new
Further reading:
How Secure Shell Works (SSH) - Computerphile
What Is SSH: Understanding Encryption, Ports and Connection
What is SSH? | Secure Shell (SSH) protocol
Be the first to comment!