Table of Contents

Secure Shell

About SSH

Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.

It replaces older protocols like Telnet or rlogin.

The specification of the SSH protocol (version 2) can be found in the following RFCs:

  • RFC 4251: The Secure Shell (SSH) Protocol Architecture
  • RFC 4252: The Secure Shell (SSH) Authentication Protocol
  • RFC 4253: The Secure Shell (SSH) Transport Layer Protocol
  • RFC 4254: The Secure Shell (SSH) Connection Protocol
Note

This list is not exhaustive.

Defining an SSH connection in a protocol

There are two methods of authentication when establishing an SSH connection:

  1. Password Authentication:

    The protocol provides a username and password to the remote SSH server for verification.

  2. Public Key Authentication:

    The protocol provides a digital signature created with a private key, and the server verifies it using the matching public key.

Apart from the specification of the connection credentials, the protocol is the same as any other serial protocol that does not use SSH (e.g. the use of headers, trailers, and timeout time for responses are supported).

Note

Typically, both methods of authentication are implemented in a protocol to give the user the choice how to connect. When both methods are configured, public key authentication has precedence over password authentication, as this is considered more secure.

Password authentication

For this method, two parameters need to be created: one to hold the username and the other to hold the password.

Accompanying write parameters can be added so the credentials can be entered from the element.

<Param id="1100" trending="false" save="true">
    <Name>Username</Name>
    <Description>Username</Description>
    <Type>read</Type>
    <Interprete>
        <RawType>other</RawType>
        <LengthType>next param</LengthType>
        <Type>string</Type>
    </Interprete>
    <Display>
        <RTDisplay>true</RTDisplay>
        <Positions>
            <Position>
                <Page>Authentication</Page>
                <Row>0</Row>
                <Column>0</Column>
            </Position>
        </Positions>
    </Display>
    <Measurement>
        <Type>string</Type>
    </Measurement>
</Param>
<Param id="1150" setter="true">
    <Name>Username</Name>
    <Description>Username</Description>
    <Type>write</Type>
    <Interprete>
        <RawType>other</RawType>
        <LengthType>next param</LengthType>
        <Type>string</Type>
    </Interprete>
    <Display>
        <RTDisplay>true</RTDisplay>
        <Positions>
            <Position>
                <Page>Authentication</Page>
                <Row>0</Row>
                <Column>0</Column>
            </Position>
        </Positions>
    </Display>
    <Measurement>
        <Type>string</Type>
    </Measurement>
</Param>
<Param id="1101" trending="false" save="true">
    <Name>Password</Name>
    <Description>Password</Description>
    <Type>read</Type>
    <Interprete>
        <RawType>other</RawType>
        <LengthType>next param</LengthType>
        <Type>string</Type>
    </Interprete>
    <Display>
        <RTDisplay>true</RTDisplay>
        <Positions>
            <Position>
                <Page>Authentication</Page>
                <Row>1</Row>
                <Column>0</Column>
            </Position>
        </Positions>
    </Display>
    <Measurement>
    <Type options="password">string</Type>
    </Measurement>
</Param>
<Param id="1151" setter="true">
    <Name>Password</Name>
    <Description>Password</Description>
    <Type>write</Type>
    <Interprete>
        <RawType>other</RawType>
        <LengthType>next param</LengthType>
        <Type>string</Type>
    </Interprete>
    <Display>
        <RTDisplay>true</RTDisplay>
        <Positions>
            <Position>
                <Page>Authentication</Page>
                <Row>1</Row>
                <Column>0</Column>
            </Position>
        </Positions>
    </Display>
    <Measurement>
        <Type options="password">string</Type>
    </Measurement>
</Param>
Important

Use the password option on the parameter holding the password. Using this option ensures greater security.

The two parameters also need to be defined in the port settings.

<PortSettings name="SSH Connection">
    <IPport>
        <DefaultValue>22</DefaultValue>
    </IPport>
    <BusAddress>
        <Disabled>true</Disabled>
    </BusAddress>
    <PortTypeSerial>
        <Disabled>true</Disabled>
    </PortTypeSerial>
    <PortTypeUDP>
        <Disabled>true</Disabled>
    </PortTypeUDP>
    <SSH>
        <Credentials>
            <Username pid="1100"/>
            <Password pid="1101"/>
        </Credentials>
    </SSH>
</PortSettings>

The connection is then established by DataMiner, provided the correct username and password are filled in.

Public key authentication

For this method, a parameter needs to be created to hold the path to the private key file.

The content of this parameter should be formatted like this: key=C:\Users\User\.ssh\my_key_rsa

Note

If the private key is protected by a passphrase, it must be appended to the file path, separated by a semicolon. It should be formatted like this: key=C:\Users\User\.ssh\my_key_rsa;pass=passphrase

<Param id="1200" trending="false" save="true">
    <Name>PrivateKeyAndPassphrase</Name>
    <Description>Private Key and Passphrase</Description>
    <Type>read</Type>
    <Interprete>
        <RawType>other</RawType>
        <LengthType>next param</LengthType>
        <Type>string</Type>
    </Interprete>
</Param>

This parameter also needs to be defined in the port settings.

<PortSettings name="SSH Connection">
    <IPport>
        <DefaultValue>22</DefaultValue>
    </IPport>
    <BusAddress>
        <Disabled>true</Disabled>
    </BusAddress>
    <PortTypeSerial>
        <Disabled>true</Disabled>
    </PortTypeSerial>
    <PortTypeUDP>
        <Disabled>true</Disabled>
    </PortTypeUDP>
    <SSH>
       <Identity pid="1200"/>
    </SSH>
</PortSettings>

The connection is then established by DataMiner, provided the parameter holds the private key and passphrase.

Remarks

Once authentication is successful, the socket timeout is set to zero (no timeout) to keep the connection from being closed when no activity occurs on the SSH connection for timeoutTime ms (RN 3303).

Differences with serial communication

There are a number of differences between implementing serial communication and implementing serial communication using an SSH connection.

  • Headers are not supported for SSH. Only trailers.
  • For commands sent via SSH, you do not need to send the Carriage Return (0x0D) and New Line (0x0A) characters to indicate the end of the command. This is done automatically.
  • Separating multiple SSH commands using ';' or 'enters' inside one DataMiner command is not supported.
  • The first part of a response is the corresponding command that has been sent.

Selecting a local port

Up to DataMiner 7.0.3, DataMiner uses the same SSH connection if the polling IP is the same (RN 3859), which can cause problems. A workaround is to specify a different local IP port in the element wizard.

By default, it is not possible to change the local IP port in the element wizard. You therefore need to define the following in the protocol:

<PortSettings>
    <LocalIPport>
        <DefaultValue>200</DefaultValue>
        <Disabled>false</Disabled>
    </LocalIPport>
</PortSettings>

alt text

SSH logging

A dedicated log file is used for the SSH connections: "SLSSH.txt". Standard logging provides information about the following:

  • Create Object
  • Open 1.2.3.4
  • Open Exception
  • Open Completed
  • Connect 1.2.3.4
  • Connect Exception
  • Connect Complete
  • Close
  • Close Exception
  • Close Complete
  • Set Timeout
  • Set Timeout Exception
  • Set RetryTime
  • Trailer=<none>
  • Trailer=<xxx> (x times)
  • Read Exception
  • Write Exception
  • WriteLine Exception

More logging can be obtained by creating a file with the name "SLSSHExt.txt". This will activate extended logging and DataMiner will then write additional information regarding the beginning and end of reads/writes and what data is written/read to this log file.

Caution

Extended logging uses a lot of memory, so do not keep this running if it is not needed.

SSH support in DataMiner

Key exchange algorithms

DataMiner will propose the following key exchange algorithms to the server in the following order:

  1. ecdh-sha2-nistp521
  2. ecdh-sha2-nistp384
  3. ecdh-sha2-nistp256
  4. diffie-hellman-group14-sha1
  5. diffie-hellman-group1-sha1
  6. diffie-hellman-group-exchange-sha1

Ciphers

DataMiner will propose the following ciphers to the server in the following order:

  1. aes256-ctr
  2. aes128-ctr
  3. aes128-cbc
  4. 3des-cbc

Hash-based Message Authentication Codes (HMAC)

DataMiner will propose the following hash-based message authentication algorithms (HMAC) to the server in the following order:

  1. HMAC-SHA2-512-etm@openssh.com (from DataMiner 10.3.0 [CU11]/10.4.2 onwards)
  2. HMAC-SHA2-256-etm@openssh.com (from DataMiner 10.3.0 [CU11]/10.4.2 onwards)
  3. HMAC-SHA2-512 (from DataMiner 10.2.5/10.3.0 onwards)
  4. HMAC-SHA2-256
  5. HMAC-SHA1
  6. HMAC-MD5

Host key types

  • ecdsa-sha2-nistp521 (from DataMiner 10.2.6/10.3.0 onwards)
  • ecdsa-sha2-nistp384 (from DataMiner 10.2.6/10.3.0 onwards)
  • ecdsa-sha2-nistp256 (from DataMiner 10.2.6/10.3.0 onwards)
  • ssha-rsa
  • ssh-dss

Selecting the key exchange algorithm

From DataMiner 9.5.1 (RN 13897) onwards, it is possible to specify the key exchange algorithm to be used when connecting to an SSH server.

You can do so by defining a serial connection that specifies the key exchange algorithm in the KexAlgorithms tag.

<Connection id="1" name="SSH Connection">
    <Type>serial</Type>
    <CommunicationOptions>
        <KexAlgorithms>
        <KexAlgorithm>diffie-hellman-group1-sha1</KexAlgorithm>
        <KexAlgorithm>diffie-hellman-group-exchange-sha1</KexAlgorithm>
        </KexAlgorithms>
    </CommunicationOptions>
</Connection>

SCP/SFTP

When you need to implement SCP or SFTP in a protocol, we recommend referencing the SSH.NET library in a QAction. See https://github.com/sshnet/SSH.NET.

See also