Resilient connections for SSH and TLS

被引:0
|
作者
Koponen, Teemu [1 ]
Eronen, Pasi [2 ]
Sarela, Mikko [3 ]
机构
[1] Helsinki Inst Informat Technol, Helsinki, Finland
[2] Nokia Res Ctr, Helsinki, Finland
[3] Aalto Univ, Lab Theoret Comp Sci, Helsinki, Finland
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Disconnection of an SSH shell or a secure application session due to network outages or travel is a familiar problem to many Internet users today. In this paper, we extend the SSH and TLS protocols to support resilient connections that can span several sequential TCP connections. The extensions allow sessions to survive both changes in IP addresses and long periods of disconnection. Our design emphasizes deployability in real-world environments, and addresses many of the challenges identified in previous work, including assumptions made about network middleboxes such as firewalls and NATs. We have also implemented the extensions in the OpenSSH and PureTLS software packages and tested them in practice.
引用
收藏
页码:329 / +
页数:3
相关论文
共 50 条
  • [1] SSH as an Alternative to TLS in IoT Environments using HTTP
    David de Hoz, J.
    Saldana, Jose
    Fernandez-Navajas, Julian
    Ruiz-Mas, Jose
    Guerrero Rodriguez, Rebeca
    Mar Luna, Felix de Jesus
    [J]. 2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 19 - 24
  • [2] Resilient connections
    Rossi, Adriana
    Barsanti, Sara Gonizzi
    [J]. VITRUVIO-INTERNATIONAL JOURNAL OF ARCHITECTURAL TECHNOLOGY AND SUSTAINABILITY, 2021, 6 (01): : 24 - 37
  • [3] Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks
    Golobiewski, Zbigniew
    Kutylowski, Miroslaw
    Zagorski, Filip
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 191 - +
  • [4] Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH
    Bhargavan, Karthikeyan
    Leurent, Gaetan
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [5] Attack-Resilient TLS Certificate Transparency
    Khan, Salabat
    Zhu, Liehuang
    Zhang, Zijian
    Rahim, Mussadiq Abdul
    Khan, Khalid
    Li, Meng
    [J]. IEEE ACCESS, 2020, 8 : 98958 - 98973
  • [6] SSH - Secure login connections over the Internet
    Ylonen, T
    [J]. PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 37 - 42
  • [7] Different approaches for the detection of SSH anomalous connections
    Gonzalez, S.
    Herrero, A.
    Sedano, J.
    Zurutuza, Urko
    Corchado, E.
    [J]. LOGIC JOURNAL OF THE IGPL, 2016, 24 (01) : 104 - 114
  • [8] Usability Insights from Establishing TLS Connections
    Kraus, Lydia
    Grabovsky, Matej
    Ukrop, Martin
    Galanska, Katarina
    Matyas, Vashek
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 289 - 305
  • [9] Enhancement in SNMP Services with Improved Security with the Impact of SSH, TLS and DTLS Protocols
    Jatothu, Rajaram
    Narasimha, G.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 888 - 895
  • [10] Safe Configuration of TLS Connections Beyond Default Settings
    Atighetchi, Michael
    Soule, Nathaniel
    Pal, Partha
    Loyall, Joseph
    Sinclair, Asher
    Grant, Robert
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 415 - 422