1 / 20

Remote Login And Desktop

Remote Login And Desktop. TELNET, SSL. Remote Interactive Computing. TCP make possible interactive use of remote machine. A client program establishes a TCP connection to server, then start sending commands to the server and displays output send by the server.

munin
Download Presentation

Remote Login And Desktop

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remote Login And Desktop TELNET, SSL

  2. Remote Interactive Computing • TCP make possible interactive use of remote machine. • A client program establishes a TCP connection to server, then start sending commands to the server and displays output send by the server. • Problem: One server for each computation service will overload the machine with server processes. • Solution: Create a machine that allows a user to establish a session on the remote machine and then run any application. This is known as Remote Desktop Facility.

  3. TELNET Protocol • TELNET is the TCP/IP protocol suite member. It’s a simple textual remote terminal protocol. • TELNET establishes a TCP connection and passes keystrokes from the user’s keyboard directly to the remote computer. • TELNET also carries textual output from the remote machine back to the user’s screen. • This service is called transparent.

  4. Basic services provided by TELNET • It defines a network virtual terminal, that provides a standard interface to remote systems. • It includes a mechanism that allows the client and server to negotiate options, and provides a set of standard options. • TELNET treats both ends of the connection symmetrically. It does not force client input to come from a keyboard nor the client has to display the output on the screen.

  5. Server sends to pseudo terminal Client reads from terminal Client sends to server TELNET Client TELNET Server Server receives from client User’s Keyboard & Display Operating System Operating System TCP / IP Internet

  6. Advantages and Disadvantages for the TELNET server to be an application level program • Advantage : It makes modification and control of the server easier than if the code were embedded in the OS. • Disadvantage : Inefficiency

  7. Accommodating Heterogeneity • To make TELNET interoperate between as many as systems possible, it must accommodate the details of various computers and OS. • The specific keystrokes used to interrupt a program varies from system to system. • TELNET defines how data and command sequences are sent across the internet, is known as the Network Virtual Terminal (NVT).

  8. Definition of NVT format • All communication invokes 8 bit bytes. • It uses the standard 7-bit USASCII representation for data and reserves byte with the higher order bit set for command sequences. • All characters that represent printable values are assigned the same meaning as in the standard USASCII character set.

  9. Passing commands that control the Remote side • TELNET NVT accommodates control functions by defining how they are passed from the client to the server. eg. CTRL + C in Unix will terminate the running program.

  10. Forcing the server to read a control function • PROBLEM: • Sending control functions along with normal data is not always sufficient to guarantee the desired results. • If the application at the server’s side stops reading i/p, OS buffer will eventually fill and the server will block attempting to write data to the pseudo terminal. • If the user generates an interrupt control function when buffers are filled, the control function will never reach the server.

  11. Solution: • TELNET uses an out of band signal. • It implements out of band signaling with the urgent data mechanism. • Whenever it places a control function in the data stream, also sends SYNCH command. • TELNET appends a reserved octet called the Data Mark, and causes TCP to signal the server by sending a significant URGENT DATA bit set.

  12. Telnet Options • Whether the TELNET operates in Half or Full Duplex mode. • Allow the server on a remote machine to determine the user terminal type. The terminal type is important for software that generates cursor positioning sequence.

  13. Examples of Telnet Options

  14. Option Negotiation • TELNET uses a symmetric option negotiation mechanism to allow clients and servers to reconfigure the parameters, controlling their interaction. • Because all TELNET software understand a basic NVT protocol, clients and servers can interoperate even if one understands options another does not. • In telnet terminology : Request is WILL X Response is either DO X or DON’T X

  15. Secure Shell (SSH) • Popular alternative to TELNET. • Provides 2 significant enhancements: 1) Provides secure connection. 2) Provides users with the ability to perform additional, independent data transfer over the same connection that is used for remote login. • SSH offers 3 mechanisms that form basis of the services. • A Transport Level Protocol provides server authentication, data confidentiality and data integrity with perfect forward secrecy.

  16. A user authentication protocol that authenticates the user to the server. Thus, a server can tell exactly which user is attempting to form a connection. • A connection protocol that multiplexes multiple logical communication channels over a single underlying SSH connection. • SSH uses public key cryptography for server authentication and allows the use of either iterative passwords or public key cryptography for user authentication. • Secret Key/ Session key is negotiated by the client and the server before any application data transfer occures.

  17. Port Forwarding • Most powerful aspect of the SSH multiplexing mechanism, is port forwarding • SSH connection can be used as a secure tunnel between two computers, and a user can configure SSH to automatically splice an incoming TCP connection to a new connection across the tunnel. • Splicing that occurs when a connection is made to the client side of the tunnel is known as Local Port Forwarding. • Splicing that occurs when a connection is made to the server side is known as Remote Port Forwarding.

  18. Advantage of Port Forwarding • It allows arbitrary applications to pass data between two sites – instead of having two separate client and server software implement encryption for each application, SSH can be configured to allow all of a user’s applications to communicate over a single SSH connection.

  19. Other Remote Access Technologies • Rlogin : Earliest alternative to TELNET, part of BSD Unix OS. It created an idea of trusted hosts. • User can control access to their personal account by authorizing remote login based on remote host and remote user names. • Virtual Network Computing (VNC) :Provides a remote desktop capability instead of a textual interface. Runs across multiple platforms. • Remote Desktop Protocol (RDP): Microsoft has defined RDP for use with their OS. It works like other remote desktop system.

More Related