Тёмный

SSH with No Open Ports - Secure Open Source Remote Access 

Подписаться
Просмотров 4,6 тыс.
% 84

Tired of exposed ports and security risks with SSH? This video unveils innovative Open-Source technique for secure SSH access without opening a single port. Discover the future of remote connections with enhanced security and flexibility!
How it works: www.noports.com/sshnp-how-it-works
Audit the code yourself: github.com/atsign-foundation/noports
Try our free trial using code “14dayfreetrial”
No Ports: www.noports.com/
Website: atsign.com/

Развлечения

Опубликовано:

 

25 апр 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 15   
@bip901
@bip901 2 месяца назад
After reading the architecture presented on their website - you initiate the connection through a proxy server, so the target machine technically has no publicly accessible ports since it only opens a port accessible to the proxy server. But that's just moving the attack surface a step back, people can still challenge the proxy server... No matter how complex a scheme you come up with, as long as you can access the password checking surface, other people can, too.
@colinconstable9300
@colinconstable9300 2 месяца назад
TCP Connectivity does indeed go through a rendezvous/relay point. But each connection is on a new TCP port and authenticated using standard PKI. But importantly the traffic itself is then encrypted with an AES256 key that only the client machine and the remote device have. The AES key is derived on the client machine and sent (again end to end encrypted) to the remote device. Bottom line yes the proxy server could be attacked but it itself has only random ports open and every connection is cryptographically challenged. But even then it never has anything of value, by which I mean it never sees anything in the clear and never has the encryption keys for the TCP connection or SSH keys.
@HideBuz
@HideBuz 2 месяца назад
You can just setup wireguard and offer ssh only via that connection. No need to open port 22.
@rtcmedic
@rtcmedic 2 месяца назад
So instead of using an open sourced, heavily reviewed protocol and service, you have another entry point, most likely closed sourced and proprietary, to tell the server to allow SSH connection to proceed. I prefer to use fail2ban on my exposed linux boxen to just IP block anybody after 3 failed attempts. I have even setup alerts to monitor the fail2ban log to alert me if a large number of failed attempts occur.
@user-rc1nv1je2y
@user-rc1nv1je2y 2 месяца назад
Agreed, and you can use an IP whitelist at the cloud provider level instead of making port 22 open to the internet.
@colinconstable9300
@colinconstable9300 2 месяца назад
The whole of SSH No Ports is open source so no proprietary code, you can read on the Atsign website blog why in a post just this week. We take many precautions to ensure that there is no surface for intervention in SSH No Ports. Before an SSH session is started, all 3 entities (client, server and relay), must perform a signature verification proof to verify them. We then take the precaution of cutting a new AES stream encryption key, and ephemeral SSH key pair on the local machine. These are transmitted to the SSH server entirely edge-to-edge encrypted (the encryption keys are stored at each edge, we couldn't decrypt the data even if we tried). Then both sides proceed to authenticate to the relay, which doesn't have the stream encryption key (so it also cannot decrypt the data stream from either end, preventing the intervention of a MitM or preauth attack). Then we proceed with an ephemeral SSH tunnel to port 22 which your client can connect to over the loopback interface. So yes we are security and privacy advocates and write everything in the open
@AtsignCo
@AtsignCo 2 месяца назад
The whole of SSH No Ports is open source so no proprietary code, you can read on the Atsign website blog why in a post just this week. We take many precautions to ensure that there is no surface for intervention in SSH No Ports. Before an SSH session is started, all 3 entities (client, server and relay), must perform a signature verification proof to verify them. We then take the precaution of cutting a new AES stream encryption key, and ephemeral SSH key pair on the local machine. These are transmitted to the SSH server entirely edge-to-edge encrypted (the encryption keys are stored at each edge, we couldn't decrypt the data even if we tried). Then both sides proceed to authenticate to the relay, which doesn't have the stream encryption key (so it also cannot decrypt the data stream from either end, preventing the intervention of a MitM or preauth attack). Then we proceed with an ephemeral SSH tunnel to port 22 which your client can connect to over the loopback interface. So yes we are security and privacy advocates and write everything in the open You can also look and Audit the code yourself: github.com/atsign-foundation/noports\ Read more on Why we choose Open Source: atsign.com/resources/articles/why-open-source/
@AlcorSalvador
@AlcorSalvador 2 месяца назад
No mentioning that this is a paid service. smh
@davidm8030
@davidm8030 2 месяца назад
Port knocking is an alternative
@wildgreen17
@wildgreen17 Месяц назад
This is a good point, however, port knocking is susceptible to man in the middle attacks. The knocking sequences can be intercepted (and potentially modified to the attacker's liking). Not to mention an attacker can impersonate the server itself. With No Ports, the atSigns communicating are the only ones that can send and receive data through the use of keys. It's interesting stuff, you can learn more about it on their website: www.noports.com/sshnp-how-it-works
@MrPir84free
@MrPir84free 2 месяца назад
0.0.0.0/0 is a matter of convenience. It's not like one could not manage access and tighten that down a little bit, right ?
@AtsignCo
@AtsignCo 2 месяца назад
That is correct if you know the IP addresses you will being accessing the SSH server from. But if you are on the road or coming from a mobile device you will not know the IP address you will be coming from hence it really has to be as open as this in most cases.
@xiconfjs
@xiconfjs 2 месяца назад
just a commerical...nothing to see here.
@7200D2KJA
@7200D2KJA 2 месяца назад
Why post a video about a functionality or service without explaining how it works, how to set it up or indeed that it is a paid service?
@wildgreen17
@wildgreen17 Месяц назад
You should check out the rest of the videos on the channel ;) for example: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-HSthe7wVGao.html