LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 04-22-2012, 07:38 AM   #1
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Rep: Reputation: Disabled
SSH2 Protocol In depth Questions :)


Hi guys,

I just have some questions about SSH2 mechanism which I hope anyone can answer . But please, If you are not sure 100% about your answer, don’t post it cause I read a lot of conflicting comments on the web.

My Questions:

1-Are DSA and RSA independent encryption ciphers (cryptosystems) just as any other ciphers like AES, 3DES, ..etc and not just a asymmetric key generators that are used under other symmetric encryption algorithms ?

2- It is believed that RSA or DSA is used just for the authentication phase of the connection and the rest of the connection is just encrypted with symmetric algorithm (private key). Is that true ?

Because I read that SSH2 is a hybrid protocol which uses both symmetric and asymmetric encryption ciphers. Symmetric encryption for encrypting the bulk of the message and symmetric encryption for encrypting the symmetric key itself. Do they mean hybrid just for the authentication phase or for the entire session ?

3- Are the keys used to encrypt/decrypt is sent with each and every transmission of an encrypted packet, or the server/client establish the key first, then only the encrypted packet is sent ?

Thanks guys and it is my honor to be with you in such beautiful forum. Good Luck All.
 
Click here to see the post LQ members have rated as the most helpful post in this thread.
Old 04-22-2012, 08:30 AM   #2
descendant_command
Senior Member
 
Registered: Mar 2012
Posts: 1,876

Rep: Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643Reputation: 643
Quote:
Originally Posted by LinuxInDepth View Post
Hi guys,

I just have some questions about SSH2 mechanism which I hope anyone can answer . But please, If you are not sure 100% about your answer, don’t post it cause I read a lot of conflicting comments on the web.

My Questions:

1-Are DSA and RSA independent encryption ciphers (cryptosystems) just as any other ciphers like AES, 3DES, ..etc and not just a asymmetric key generators that are used under other symmetric encryption algorithms ?
I think maybe that is not the case, but I'm not sure.
Quote:

2- It is believed that RSA or DSA is used just for the authentication phase of the connection and the rest of the connection is just encrypted with symmetric algorithm (private key). Is that true ?

Because I read that SSH2 is a hybrid protocol which uses both symmetric and asymmetric encryption ciphers. Symmetric encryption for encrypting the bulk of the message and symmetric encryption for encrypting the symmetric key itself. Do they mean hybrid just for the authentication phase or for the entire session ?
Possibly. It could depend on one of several factors.
Quote:
3- Are the keys used to encrypt/decrypt is sent with each and every transmission of an encrypted packet, or the server/client establish the key first, then only the encrypted packet is sent ?
Some might say yes, but they could be mistaken.
Quote:
Thanks guys and it is my honor to be with you in such beautiful forum. Good Luck All.
No problem, good luck with your homework.
 
Old 04-22-2012, 08:44 AM   #3
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
descendant_command

You Joking ... Right ?

There is no even a single helpful answer
 
Old 04-22-2012, 09:52 AM   #4
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,634

Rep: Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965
Quote:
Originally Posted by LinuxInDepth View Post
descendant_command
You Joking ... Right? There is no even a single helpful answer
Well, based on this:
Quote:
Originally Posted by LinuxInDepth
But please, If you are not sure 100% about your answer, don’t post it
..what do you expect? This sounds VERY much like a homework question, and such questions aren't typically answered on LQ. If you want the full SSH2 protocol details, you can easily find them via Google:
https://www.ietf.org/rfc/rfc4251.txt
 
3 members found this post helpful.
Old 04-22-2012, 12:11 PM   #5
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
aaah , i got it now why u all say homework

abstemiously no guys .. it is not a homework

I study alone and i read a lot of articles .. i understood almost all aspects of SSH2 but i didn't find a good clarification for the three points stated above.

i will read the documentation Allah willing, but if u can provide me with a short answer will be cool too.

thanks guys.
 
Old 04-22-2012, 02:38 PM   #6
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,634

Rep: Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965
Quote:
Originally Posted by LinuxInDepth View Post
aaah , i got it now why u all say homework
abstemiously no guys .. it is not a homework

I study alone and i read a lot of articles .. i understood almost all aspects of SSH2 but i didn't find a good clarification for the three points stated above.

i will read the documentation Allah willing, but if u can provide me with a short answer will be cool too.
thanks guys.
You need to spell out your words. And if it's not homework, what are you trying to accomplish? Being pointed to the IETF specs on the protocol will answer ALL your questions.

Sorry, but you need to put effort into getting your answers. The docs from IETF were easy to find, and answer your questions. If you can't be bothered reading them, then your questions will go unanswered.

Last edited by TB0ne; 04-22-2012 at 03:58 PM.
 
Old 04-23-2012, 03:04 AM   #7
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
Man, Take it easy !!!!

I said "if u can" .. either if u can or not >> i will read the RFC to be 100% sure

I will not take your words for granted.. just it will help me regroup all pieces of the puzzle.

I have been visiting a lot of Linux forums and i have never seen this kind of aggressive attitude before

Thanks anyway !!
 
Old 04-23-2012, 06:58 AM   #8
Aquarius_Girl
Senior Member
 
Registered: Dec 2008
Posts: 4,731
Blog Entries: 29

Rep: Reputation: 940Reputation: 940Reputation: 940Reputation: 940Reputation: 940Reputation: 940Reputation: 940Reputation: 940
Mate, you need to "show" your efforts when you post a
question. If you have searched Google in depth, then you
need to quote out whatever you didn't understand or found
conflicting (with references).

Simply saying What is XX? will get you the kind of responses
you have got above.

BTW,
u != you
ur != your
plz != please
 
2 members found this post helpful.
Old 04-23-2012, 07:22 AM   #9
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
Yes I will do that

Btw, I got the first question answered
 
Old 04-23-2012, 10:17 AM   #10
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,634

Rep: Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965
Quote:
Originally Posted by LinuxInDepth View Post
Man, Take it easy !!!!
I said "if u can" .. either if u can or not >> i will read the RFC to be 100% sure
I will not take your words for granted.. just it will help me regroup all pieces of the puzzle.
I have been visiting a lot of Linux forums and i have never seen this kind of aggressive attitude before
Thanks anyway !!
Again, spell out your words. And this is not an "aggressive attitude"....it's simply stating a fact. The protocol specs were very easy to find, which then answer all of your questions. You were given the link, but then asked for someone else to go through the docs, to give you the SPECIFIC answers that YOU wanted. As said, just show some effort into doing your own research.
 
Old 04-23-2012, 12:26 PM   #11
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
I didn't ask you or anybody else to go through the docs !!!

If you already know the answer, help me with it. If not, you provide the way I have to go to answer myself

I didn't ask you or anybody else to go through the docs !!!

And .. why are you 100% that the SPECS will answer all my concerns ? why are u 100% sure that i am a lazy ass who doesn't do good research before asking !!?
Maybe i am confused about something that need some more clues that is not presented in the DOCs... and i didn't ask you to explain the whole protocol. I asked a three simple questions.

If the DOCS are the only way i can get help from... so why does this forum exists at all !!

Bro, If you please .. If you see any question from me in the future, please don't help me even if you know the exact answer.

Thanks
 
Old 04-23-2012, 08:41 PM   #12
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,634

Rep: Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965Reputation: 7965
Quote:
Originally Posted by LinuxInDepth View Post
I didn't ask you or anybody else to go through the docs !!!
If you already know the answer, help me with it. If not, you provide the way I have to go to answer myself
I did provide you with the way to answer it yourself by giving you the link to the specs.
Quote:
I didn't ask you or anybody else to go through the docs !!!

And .. why are you 100% that the SPECS will answer all my concerns ? why are u 100% sure that i am a lazy ass who doesn't do good research before asking !!?
The specs detail EXACTLY how the protocol operates, and ALL of the functions of it. If that doesn't tell you how it works, I'm not sure what would. And AGAIN, you need to spell out your words. It's "you", not "u".
Quote:
Maybe i am confused about something that need some more clues that is not presented in the DOCs... and i didn't ask you to explain the whole protocol. I asked a three simple questions.

If the DOCS are the only way i can get help from... so why does this forum exists at all !!
Forums exist for specific questions, like "I have Fedora 16...I'm trying to run SSH, but I'm getting error xxx". SSH is platform independent, and the only way to get details about that is to read the specs on the protocol. To clarify a bit more, even if your Dell laptop is running Linux, coming here and asking "I need the specs for the processor of my Dell laptop", won't get you much but a link to the Dell website, since they are the ones who designed it.
Quote:
Bro, If you please .. If you see any question from me in the future, please don't help me even if you know the exact answer.
Thanks
I'm not your "bro"...wouldn't be too thrilled if I was. You asked three questions, and were given a link to where the answers were. Apparently, you weren't too happy about that, and asked for further clarification (that would be, US going through the docs to answer your questions). Sorry if the answer wasn't what you wanted, but it was what you asked for.

Last edited by TB0ne; 04-23-2012 at 08:44 PM.
 
1 members found this post helpful.
Old 04-24-2012, 12:50 AM   #13
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
WOW...

Mr TB0ne, again, Take it easy !!!

Again, If you see anything from me in the future, just ignore me and save us the time wasted arguing with each other.

Thanks

Last edited by LinuxInDepth; 04-24-2012 at 12:52 AM.
 
Old 04-24-2012, 03:54 AM   #14
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
Thanks To Allah, all my questions have been answered

Subject Closed
 
Old 04-24-2012, 04:59 AM   #15
LinuxInDepth
LQ Newbie
 
Registered: Apr 2012
Posts: 10

Original Poster
Rep: Reputation: Disabled
MY Conclusion:

1- DSA and RSA which are two types of "Asymmetric CryptoSystem" are not just
key generation methods to be used in other "Symmetric Encryption Algorithms". They are independent encryption algorithm.

2- I think this belief is wrong "Asymmetric Encryption" is not just for SSH2 authentication
phase. Actually SSH2 uses "Asymmetric encryption (DSA or RSA)" for authentication and
also for encrypting a hash of the original message (done with a HMAC hash algorithm) in
order to provide both "Message Integrity" and "Digital Signature Verification", because
as u know what a public key encrypts, only can be decrypted by it's private one which
in sole possession of the receiver.

3- Actually I haven't find a clear answer for this question. But I think SSH2 doesn't do
that (doesn't transmit the keys with each and every transmission of an encrypted
package).

I ask myself why it would do such a thing ?!

1- The "Diffie-Hellman key-exchange" algorithm dictates the secret session key in a way that both the client and the server know it without the need of one side telling the other.So both know the "symmetric key (secret session key)" to decrypt the bulk of the message.
2- When a client send a message to the server, the client encrypt the hash of the message with ((the server's public key (which is already public ))) which can be decrypted with the server's private key which no one knows except the server .

So why a sender would ever send the keys to a recipient who already knows them

That's why I think SSH2 Doesn't send the session key nor the already public "public
key" with every and each transmission of an encrypted package.

Really Really.. any comments or discussions are greatly welcomed

Thanks guys

Last edited by LinuxInDepth; 04-24-2012 at 07:31 AM.
 
  


Closed Thread



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
GIOP protocol questions felbvts Linux - Networking 0 04-20-2009 09:05 AM
LXer: Tutorial: Border Gateway Protocol, The Routing Protocol of the Internet LXer Syndicated Linux News 0 11-13-2008 05:11 AM
help:multimedia commands in linux (SCSI 3 protocol), howto's questions jaepi Programming 0 06-04-2007 08:18 PM
How to :: Securing SSH: protocol SSH2 and hiding the direct access of root sysconfig Red Hat 3 09-07-2006 08:30 AM
Unsupported protocol 'Compression Control Protocol' (0x80fd) received RKris Linux - Software 0 08-21-2002 08:24 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:09 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration