The Illustrated Network- P69
Số trang: 10
Loại file: pdf
Dung lượng: 412.75 KB
Lượt xem: 1
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
The Illustrated Network- P69:In this chapter, you will learn about the protocol stack used on the global publicInternet and how these protocols have been evolving in today’s world. We’llreview some key basic defi nitions and see the network used to illustrate all of theexamples in this book, as well as the packet content, the role that hosts and routersplay on the network, and how graphic user and command line interfaces (GUIand CLI, respectively) both are used to interact with devices.
Nội dung trích xuất từ tài liệu:
The Illustrated Network- P69 CHAPTER 25 Secure Shell (Remote Access) 649transfer would be done with sftp (in the SSH implementation known as Tectia, sftp isconfusingly invoked with the command scp2). The point here is that both methods will transfer the file as long as everything elseis set up correctly. The best book on SSH—SSH: The Secure Shell, by Daniel J. Barrett,Richard E. Silverman, and Robert G. Byrnes (O’Reilly Media)—is about as long as thisone. Interested readers are referred to this text for more detailed information on SSH.SSH IN ACTIONIf there is one thing that was used more than FTP to produce this book, it’s SSH. In fact, allof the file transfers used to consolidate output for these examples could just as easily havebeen done with SCP or SFTP. This is especially true when routers are the remote systems:Only in special circumstances will organizations allow or use Telnet for router access. Let’s use SSH to contact the routers on the Illustrated Network. Naturally, the rout-ers have been set up ahead of time to allow administrator access from certain hosts onLAN1 and LAN2 and are running sshd. But on the client side, we’ll run ssh “out of thebox” and see what happens. Ethereal captures are not the best way to look at SSH in action. The secure andencrypted transfers make packet analysis difficult (and often impossible). Fortunately,we can use the debug feature of SSH itself to analyze the exchange in very verboseform (using the –vv option). Let’s see if we can catch SSH-TRANS, SSH-AUTH, and SSH-CONN in action when weaccess router TP2 (10.10.11.1) from bsdclient. We’ll log in (the -l option) as admin.bsdclient# ssh -vv -l admin 10.10.11.1OpenSSH_3.5p1 FreeBSD-20030924, SSH protocols 1.5/2.0, OpenSSL 0x0090704fdebug1: Reading configuration data /etc/ssh/ssh_configdebug1: Rhosts Authentication disabled, originating port will not be trusted.debug1: ssh_connect: needpriv 0debug1: Connecting to 10.10.11.1 [10.10.11.1] port 22.debug1: Connection established.debug1: identity file /root/.ssh/identity type -1debug1: identity file /root/.ssh/id_rsa type -1debug1: identity file /root/.ssh/id_dsa type -1debug1: Remote protocol version 1.99, remote software version OpenSSH_3.8debug1: match: OpenSSH_3.8 pat OpenSSH*debug1: Enabling compatibility mode for protocol 2.0debug1: Local version string SSH-2.0-OpenSSH_3.5p1 FreeBSD-20030924debug1: SSH2_MSG_KEXINIT sentdebug1: SSH2_MSG_KEXINIT receiveddebug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie- hellman- group1-sha1debug2: kex_parse_kexinit: ssh-dss,ssh-rsadebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se650 PART VI Securitydebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.sedebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie- hellman- group1-sha1debug2: kex_parse_kexinit: ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128- ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128- ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: mac_init: found hmac-md5debug1: kex: server->client aes128-cbc hmac-md5 nonedebug2: mac_init: found hmac-md5debug1: kex: client->server aes128-cbc hmac-md5 nonedebug1: SSH2_MSG_KEX_DH_GEX_REQUEST sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_GROUPdebug1: dh_gen_key: priv key bits set: 136/256debug1: bits set: 1042/2049debug1: SSH2_MSG_KEX_DH_GEX_INIT sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_REPLYdebug1: Host 10.10.11.1 is known and matches the DSA host key.debug1: Found key in /root/.ssh/known_hosts:1debug1: bits set: 1049/2049debug1: ssh_dss_verify: signature correctdebug1: kex_derive_keysdebug1: newkeys: mode 1debug1: SSH2_MSG_NEWKEYS sentdebug1: waiting for SSH2_MSG_NEWKEYSdebug1: newkeys: mode 0debug1: SSH2_MSG_NEWKEYS received CHAPTER 25 Secure Shell (Remote Access) 651debug1: done: ssh_kex2.debug1: send SSH2_MSG_SERVICE_REQUESTdebug1: service_accept: ssh-userauthdebug1: got SSH2_MSG_SERVICE_ACCEPTdebug1: authentications that can continue: publickey,password,keyboard- interactivedebug1: next auth method to try is publickeydebug1: try privkey: /root/.ssh/identitydebug1: try privkey: /root/.ssh/id_rsadebug1: try privkey: /root/.ssh/id_dsadebug2: we did not send a packet, disable methoddebug1: next auth method to try is keyboard-interactivedebug2: userauth_kbdintdebug2: we sent a keyboard-interactive packet, wait for replydebug1: authentications that can continue: publickey,password,keyboard- interactivedebug2: we did not send a packet, disable methoddebug1: next auth method to try is passwordadmin@10.10.11.1s pas ...
Nội dung trích xuất từ tài liệu:
The Illustrated Network- P69 CHAPTER 25 Secure Shell (Remote Access) 649transfer would be done with sftp (in the SSH implementation known as Tectia, sftp isconfusingly invoked with the command scp2). The point here is that both methods will transfer the file as long as everything elseis set up correctly. The best book on SSH—SSH: The Secure Shell, by Daniel J. Barrett,Richard E. Silverman, and Robert G. Byrnes (O’Reilly Media)—is about as long as thisone. Interested readers are referred to this text for more detailed information on SSH.SSH IN ACTIONIf there is one thing that was used more than FTP to produce this book, it’s SSH. In fact, allof the file transfers used to consolidate output for these examples could just as easily havebeen done with SCP or SFTP. This is especially true when routers are the remote systems:Only in special circumstances will organizations allow or use Telnet for router access. Let’s use SSH to contact the routers on the Illustrated Network. Naturally, the rout-ers have been set up ahead of time to allow administrator access from certain hosts onLAN1 and LAN2 and are running sshd. But on the client side, we’ll run ssh “out of thebox” and see what happens. Ethereal captures are not the best way to look at SSH in action. The secure andencrypted transfers make packet analysis difficult (and often impossible). Fortunately,we can use the debug feature of SSH itself to analyze the exchange in very verboseform (using the –vv option). Let’s see if we can catch SSH-TRANS, SSH-AUTH, and SSH-CONN in action when weaccess router TP2 (10.10.11.1) from bsdclient. We’ll log in (the -l option) as admin.bsdclient# ssh -vv -l admin 10.10.11.1OpenSSH_3.5p1 FreeBSD-20030924, SSH protocols 1.5/2.0, OpenSSL 0x0090704fdebug1: Reading configuration data /etc/ssh/ssh_configdebug1: Rhosts Authentication disabled, originating port will not be trusted.debug1: ssh_connect: needpriv 0debug1: Connecting to 10.10.11.1 [10.10.11.1] port 22.debug1: Connection established.debug1: identity file /root/.ssh/identity type -1debug1: identity file /root/.ssh/id_rsa type -1debug1: identity file /root/.ssh/id_dsa type -1debug1: Remote protocol version 1.99, remote software version OpenSSH_3.8debug1: match: OpenSSH_3.8 pat OpenSSH*debug1: Enabling compatibility mode for protocol 2.0debug1: Local version string SSH-2.0-OpenSSH_3.5p1 FreeBSD-20030924debug1: SSH2_MSG_KEXINIT sentdebug1: SSH2_MSG_KEXINIT receiveddebug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie- hellman- group1-sha1debug2: kex_parse_kexinit: ssh-dss,ssh-rsadebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se650 PART VI Securitydebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.sedebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie- hellman- group1-sha1debug2: kex_parse_kexinit: ssh-rsa,ssh-dssdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc, arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128- ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128- cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128- ctr,aes192-ctr,aes256-ctrdebug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@ openssh.com,hmac-sha1-96,hmac-md5-96debug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit: none,zlibdebug2: kex_parse_kexinit:debug2: kex_parse_kexinit:debug2: kex_parse_kexinit: first_kex_follows 0debug2: kex_parse_kexinit: reserved 0debug2: mac_init: found hmac-md5debug1: kex: server->client aes128-cbc hmac-md5 nonedebug2: mac_init: found hmac-md5debug1: kex: client->server aes128-cbc hmac-md5 nonedebug1: SSH2_MSG_KEX_DH_GEX_REQUEST sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_GROUPdebug1: dh_gen_key: priv key bits set: 136/256debug1: bits set: 1042/2049debug1: SSH2_MSG_KEX_DH_GEX_INIT sentdebug1: expecting SSH2_MSG_KEX_DH_GEX_REPLYdebug1: Host 10.10.11.1 is known and matches the DSA host key.debug1: Found key in /root/.ssh/known_hosts:1debug1: bits set: 1049/2049debug1: ssh_dss_verify: signature correctdebug1: kex_derive_keysdebug1: newkeys: mode 1debug1: SSH2_MSG_NEWKEYS sentdebug1: waiting for SSH2_MSG_NEWKEYSdebug1: newkeys: mode 0debug1: SSH2_MSG_NEWKEYS received CHAPTER 25 Secure Shell (Remote Access) 651debug1: done: ssh_kex2.debug1: send SSH2_MSG_SERVICE_REQUESTdebug1: service_accept: ssh-userauthdebug1: got SSH2_MSG_SERVICE_ACCEPTdebug1: authentications that can continue: publickey,password,keyboard- interactivedebug1: next auth method to try is publickeydebug1: try privkey: /root/.ssh/identitydebug1: try privkey: /root/.ssh/id_rsadebug1: try privkey: /root/.ssh/id_dsadebug2: we did not send a packet, disable methoddebug1: next auth method to try is keyboard-interactivedebug2: userauth_kbdintdebug2: we sent a keyboard-interactive packet, wait for replydebug1: authentications that can continue: publickey,password,keyboard- interactivedebug2: we did not send a packet, disable methoddebug1: next auth method to try is passwordadmin@10.10.11.1s pas ...
Tìm kiếm theo từ khóa liên quan:
thiết bị thi công mạng kỹ thuật thi công mạng cấu hình Cisco IOS Router Switch catalyst thiết bị kết nối mạng LanGợi ý tài liệu liên quan:
-
153 trang 28 0 0
-
Practical TCP/IP and Ethernet Networking- P8
10 trang 22 0 0 -
Practical TCP/IP and Ethernet Networking- P13
10 trang 20 0 0 -
6 vấn đề với router và các giải pháp khắc phục
5 trang 20 0 0 -
Practical TCP/IP and Ethernet Networking- P10
10 trang 20 0 0 -
BÀI TẬP THIẾT KẾ HỆ THỐNG MẠNG
3 trang 19 0 0 -
Practical TCP/IP and Ethernet Networking- P5
5 trang 18 0 0 -
Biến một PC cũ thành LAN Server bằng RouterOS – Phần 1
7 trang 17 0 0 -
Practical TCP/IP and Ethernet Networking- P5
10 trang 17 0 0 -
Practical TCP/IP and Ethernet Networking- P4
10 trang 17 0 0 -
Báo cáo bài tập nhóm môn: thiết bị mạng
8 trang 17 0 0 -
3 trang 16 0 0
-
11 trang 16 0 0
-
Practical TCP/IP and Ethernet Networking- P63
5 trang 15 0 0 -
Practical TCP/IP and Ethernet Networking- P7
10 trang 15 0 0 -
Practical TCP/IP and Ethernet Networking- P12
10 trang 15 0 0 -
Practical TCP/IP and Ethernet Networking- P9
10 trang 14 0 0 -
3 trang 14 0 0
-
7 trang 14 0 0
-
Practical TCP/IP and Ethernet Networking- P3
5 trang 14 0 0