HP StorageWorks MSA 2/8 HP StorageWorks Fabric OS Procedures V3.1.x/4.1.x User - Page 94

AES128-CBC, 3DES-CBC, Blowfish-CBC, and RC4., such as Data Encryption Standard DES, AES, etc.

Page 94 highlights

Basic Security in FOS prevent, or even detect, these attempts to sniff passwords. Secure Shell (SSH), is an alternative to Telnet, and uses strong encryption to prevent password sniffing and enhance the privacy of the management link. SSH encrypts all messages, including the client sending the password at login time. This is a significant improvement over the basic telnet and sectelnet, which encrypts only the login password. The SSH package contains a daemon (sshd) which runs on the switch, and is very similar to telnetd except that all messages are encrypted. The SSH daemon supports a wide variety of encryption algorithms, such as Data Encryption Standard (DES), AES, etc. The daemon requires keys (public/private) for encryption. These keys are generated by a program called ssh-keygen when the openssh RPM is installed. The keys are saved to files in /etc directory and sshd will read them on startup. Supported Versions and Features: ■ officially support ssh2. ssh2 uses DSA key for authentication. The DSA authentication key is 1024 bits. ■ The daemon will run under root identity. ■ A user cannot save their public keys on the switch. A password is the only method of authentication. ■ the following default ciphers for session encryption are supported: AES128-CBC, 3DES-CBC, Blowfish-CBC, Cast128-CBC, and RC4. ■ the following HMACs are supported: HMAC-MD5, HMAC-SHA1, HMAC-SHA1-96, HMAC-MD5-96. Note: If you telnet to another machine, and then start a SSH session inside that telnet session, the telnet traffic is still in clear text and not secure. Note: The FTP protocol is not secure. When you FTP to or from the switch, the contents are in clear text. This includes the remote FTP server's login and password. This limitation affects the following commands: savecore, configupload, configdownload, and firmwaredownload. 94 Fabric OS Procedures Version 3.1.x/4.1.x User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270

Basic Security in FOS
94
Fabric OS Procedures Version 3.1.x/4.1.x User Guide
prevent, or even detect, these attempts to sniff passwords. Secure Shell (SSH), is
an alternative to Telnet, and uses strong encryption to prevent password sniffing
and enhance the privacy of the management link.
SSH encrypts all messages, including the client sending the password at login
time. This is a significant improvement over the basic telnet and sectelnet, which
encrypts only the login password. The SSH package contains a daemon (sshd)
which runs on the switch, and is very similar to telnetd except that all messages
are encrypted. The SSH daemon supports a wide variety of encryption algorithms,
such as Data Encryption Standard (DES), AES, etc.
The daemon requires keys (public/private) for encryption. These keys are
generated by a program called ssh-keygen when the openssh RPM is installed.
The keys are saved to files in /etc directory and sshd will read them on startup.
Supported Versions and Features:
officially support ssh2. ssh2 uses DSA key for authentication. The DSA
authentication key is 1024 bits.
The daemon will run under root identity.
A user cannot save their public keys on the switch. A password is the only
method of authentication.
the following default ciphers for session encryption are supported:
AES128-CBC, 3DES-CBC, Blowfish-CBC, Cast128-CBC, and RC4.
the following HMACs are supported: HMAC-MD5, HMAC-SHA1,
HMAC-SHA1-96, HMAC-MD5-96.
Note:
If you telnet to another machine, and then start a SSH session inside that telnet
session, the telnet traffic is still in clear text and not secure.
Note:
The FTP protocol is not secure. When you FTP to or from the switch, the contents
are in clear text. This includes the remote FTP server's login and password. This
limitation affects the following commands:
savecore
,
configupload
,
configdownload
, and
firmwaredownload
.