Image import and SSH security in Emulab
نویسنده
چکیده
Cloud providers typically provide compute facilities for their users. It would be very convenient if users’ could import and export their machines with much greater ease to other cloud providers or to their desktops or local machines. Here, we talk about how we’ve enabled users to easily do this with Emulab. Specifically, we’ve implemented image import mechanisms to import machines from cloud providers like OpenStack and EC2 and also any other general regular Linux machine. We also discuss how we’ve implemented a SSH security system in Emulab that helps alleviate some of the security that might be brought in by such imported machines. A man in the middle attack is used in a positive way to enforce specific policies onto SSH connections. By doing this, we can apply additional constraints over incoming SSH connections that may not be enforced by the SSH server. 1 Enabling external image usage for Emulab Infrastructure-as-a-Service providers typically have specialized environments that require specific operating system adjustments to run them. Portability between these various cloud providers is usually lacking. Emulab is a network testbed is designed for users to test their applications with fine grained control for network parameters. With the growing prevalence of cloud platforms like Amazons’ Elastic Cloud Compute(EC2)[1], users of these services would like to bring in their entire stacks running on EC2 and do network specific tests on Emulab. Here, we discuss how we have integrated support for machines running on EC2 and OpenStack in Emulab and how users may import them easily into Emulab, so that they can run finer tests. 1.1 Background Emulab[11] allows you to load various images onto a physical or virtual machine and include them in a network experiment. This feature is quite similar to what various cloud providers give in relation to their compute facilities. However, Emulab provides various additional features, such as the ability to manipulate network topologies and have reproducible network effects.
منابع مشابه
Security Issues in ProtoGENI
Network security consists of primary concerns in future Internet development due to the ever increasing threats to current Internet. ProtoGENI is a federated testbed facility supporting slice-based experiments to manage, utilize, and monitor the resources for innovative network research. Security research in ProtoGENI is crucial because experiments conducted in manipulated or corruptted test en...
متن کاملPlaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
This paper presents a formal security analysis of SSH in counter mode in a security model that accurately captures the capabilities of real-world attackers, as well as security-relevant features of the SSH specifications and the OpenSSH implementation of SSH. Under reasonable assumptions on the block cipher and MAC algorithms used to construct the SSH Binary Packet Protocol (BPP), we are able t...
متن کاملProvable Security in Practice: Analysis of SSH and CBC mode with Padding
This thesis illustrates and examines the gap that exists between theoretical and practical cryptography. Provable security is a useful tool which allows cryptographers to perform formal security analyses within a strict mathematical framework. Unfortunately, the formal modelling of provable security sometimes fails to match how particular schemes or protocols are implemented in real life. We ex...
متن کاملA visual analytic approach for analyzing SSH honeypots
An SSH honeypot can be used to study the activities of an attacker by logging the full SSH session. In this paper we present an interactive visualization system that can be used by network security experts to visually analyze large sets of SSH honeypot data. By using different visualizations and interaction techniques the expert can explore SSH sessions and quickly find related sessions which w...
متن کاملFirewalling a Secure Shell Service
The security threats to networked systems have increased. The demand for accessing hosts remotely in a secure manner is therefore also increasing. In order to meet this demand, many users and network administrators use the Secure Shell (SSH) service. However, the SSH system may be configured with insecure defaults. A proxy in-between an SSH server and its clients is one possible way to enforce ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014