Feeds

SSH firm aims to untangle crypto key hairball

Fo' SHHizzle

Next gen security for virtualised datacentres

Infosec 2012 Secure Shell (SSH) certificate management – a key internet protocol used for remote access and file transfer for nearly 20 years now – can become quite a tangled issue if there isn't a clear management policy in place, and SSH Communications Security, one of the security exhibitors at Infosec, claims it has a solution.

SSH is often used for remote access and file transfer in countless organisations. The tech has been around since 1995 and has become a ubiquitous component in network systems in the 17 years since then. The protocol is used for the secure transfer of product and price lists, banking data and other classes of information. Often the technology comes bundled as a component of other software tools.

Typically organisations create a new key pair for every new application, authorised users and automated service account. Over time this has left organisations with sometimes hundreds of thousands of SSH key ‘pairs' but without a clear idea what they are used for or on which system. Key pairs ought to be updated at least every two years but there is easy way to do this and organisations are wary of retiring keys in case the process breaks the legacy system. Applications, user and service accounts each have public and private key pairs to communicate securely with target SSH servers.

SSH Communications Security is punting a management platform to help combat this.

“Enterprises' most critical data and applications are often transported and housed on SSH and OpenSSH servers," said Tatu Ylönen, chief exec of SSH Communications Security and inventor of SSH-1. "Those enterprises using public key authentication to manage access to those servers are faced with a significant challenge today in terms of knowing who and what may access those servers. This is not only a major security and compliance risk, however it is also a cost issue. Many organisations manage this function manually with little or no oversight.”

Enterprises sometimes approve access to key pairs through permissions in Active Directory, but that wouldn't stop a rogue employee who had access to key pairs at any time from abusing unrevoked access to key systems to cause damage. In addition, PCI-DSS auditors are beginning to take a closer interest in how firms manage their SSH key infrastructure, according to Ylönen. "As the scale of SSH deployment grows you get more problems because organisation have no visibility into who has access to what," Ylönen added. "Organisations might install thousands of new key pairs every year. More than half of their SSH keys would still be in use but organisations often don't know which they are."

SSH Communications Security is aiming to untangle this crypto key hairball through a User Key Management Tool. The module, which bolts into SSH's Information Integrity Platform, automates the process of identifying, organising and recycling SSH keys within a user's environment. It was launched at the RSA Conference in San Francisco back in February. It has gone though a number of trails since prior to its European showcase debut at this week's Infosecurity Europe Conference.

The key management tool comes as either software, a virtual appliance or a hardware appliance. All three form factors of the technology are capable of handling both SSH and OpenSSH keys. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.