Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
News

SSH-Based Solutions - Looking for Industry Proof? 391

mcwop asks: "My company's IT department is trying to set up secure FTP with a vendor. It would be set up on a Sun box (not running Solaris 9). I emailed suggesting they look at OpenSSH. The response I received stated that they don't like to use freeware, but only consider industry proven and supported software. I have found one commercial version at SSH. What other commercial versions are out there (I know Solaris 9 comes with SSH)? But more importantly, what are some commercial successes? What large organizations are implementing SSH?"
This discussion has been archived. No new comments can be posted.

SSH-Based Solutions - Looking for Industry Proof?

Comments Filter:
  • Client side (Score:3, Informative)

    by Archangel Michael ( 180766 ) on Monday July 01, 2002 @05:03PM (#3803118) Journal
    Tera Term on Windows is the best.
    • Re:Client side (Score:2, Informative)

      by |<amikaze ( 155975 )
      or putty. it's a 200k executable and is available on tucows
    • Re:Client side (Score:5, Informative)

      by sql*kitten ( 1359 ) on Monday July 01, 2002 @05:18PM (#3803244)
      Tera Term on Windows is the best.

      It's good, but I've switched to PuTTY [greenend.org.uk], mainly because it can heartbeat an SSH connection with an empty packet every minute to prevent sessions being timed out by over-zealous firewalls - very convenient if you need to monitor several machines.
      • I would go back to Putty in a flash if it did port forwarding. Till then, ttssh for me.
      • ya - putty rocks. and is tiny. I am going to frys later to pick up one of those USB keychains to keep putty and other things on it. I always throw putty

        but as far as the article is concerned - your managers are smoking crack if they dont think that openSSH is good enough for them.

      • If you are on a Windows based machine somewhere, and you need to use ssh, you can quickly get PuTTY from the net. It is small (220k), so you could even keep it with you on a floppy. And it is only a single executable. PuTTY is THE ssh client for Windows, IMO.
      • TT only supports SSH1 (last time I used it) which is generally weaker, (even if there isn't a pending exploit this week)...

        Even though I use Putty on windows machines (and WinSCP2) I don't like putty's interface one bit. I'd use plink (command-line putty) if it would only support all the options a the GUI putty. Right now, I just build OpenSSH under cygwin, and copy the exes and Cygwin dlls to other machines.
    • Re:Client side (Score:2, Informative)

      by Clue4All ( 580842 )
      Tera Term is most definitely NOT the best Windows SSH client. Besides being less configurable and scriptable than PuTTY, the terminal emulation is often poor, and most importantly, it doesn't support SSH v2 in the SSH add-on. If there's someone between you and your server with a sniffer, SSH v1 is no more secure than telnet, literally. You might as well put a sign up on the side of your house with your password.
    • Re:Client side (Score:3, Insightful)

      by Anonymous Coward
      neither of these are commercial products, and both are decided less professional than openssh. And as far as I know, are only clients. Vandyke.com has secureCRT plus secure terminal and FTP servers for windows. Also checkout FSecure from Datafellow.s
  • Confused (Score:4, Interesting)

    by awgy ( 315261 ) on Monday July 01, 2002 @05:03PM (#3803122) Homepage
    Perhaps I'm confused, but isn't OpenSSH a rather well-proven program?
    • Yes, it is. The confusing part is the fact that a lot of businesses won't use freeware, even when it is as well-tested as SSH!
  • Good luck... (Score:4, Insightful)

    by adam613 ( 449819 ) on Monday July 01, 2002 @05:04PM (#3803131)
    You're going to be hard-pressed to find a commercial solution which is more widely used (and therefore proven in the industry) than OpenSSH.
    • Re:Good luck... (Score:3, Interesting)

      by Nailer ( 69468 )
      The response I received stated that they don't like to use freeware, but only consider industry proven and supported software

      I agree with the poster above. Since when are these mutually exclusive? That people refer to proprietary software as `commercial' is a fault of their logic. Chances are they are already relying in soem way or another on one of the following Open Source applications that are either produced for commercial reasons and have some kind of backing. Oh, did I mention that each of these apps is the markt leader in their field?
      • the Bind DNS Server
      • Sendmail
      • Apache
      • Squid
      • WU FTPd (yes, I know it sucks, but its still the world most popular FTP)

  • Silly (Score:5, Insightful)

    by rmassa ( 529444 ) on Monday July 01, 2002 @05:04PM (#3803134)
    Why don't you talk to the openssh team? I'm sure that for some nominal fee you can get extra priority support. OpenSSH is (IMHO) the best ssh implementation out there, and its from a dedicated team where security supercedes even functionality. The newest version of OpenSSH promises to be very hard to exploit.
    • Re:Silly (Score:4, Insightful)

      by Camel Pilot ( 78781 ) on Monday July 01, 2002 @05:25PM (#3803298) Homepage Journal
      All open source (teams|foundations|etc) should have a means with which to accept payment and set a standardized "corporate quality distribution fee" for those who must pay to feel good about the transaction.

      I have run into this snobbish attitude also in my consulting work. I have been told on occasions "sorry son, we only use corporate quality software here". ...ha ha lol... What ever the heck that means! I always try to contain my mirth.

      If when proposing a particular solution I could quickly add that a site licencing fee is only $850 most corporate customers would not even flinch and would somehow feel more comfortable that they are not using some "freeware" or "shareware" product to run their business.
  • OpenSSH (Score:5, Interesting)

    by scorpioX ( 96322 ) on Monday July 01, 2002 @05:05PM (#3803142)
    Mac OS X (and X Server) ship with OpenSSH. Those are considered commercial OS's. I bet Solaris 9's SSH is also OpenSSH (don't know for sure though). Sounds like your managers have their heads where the sun doesn't shine.
  • by bee ( 15753 ) on Monday July 01, 2002 @05:06PM (#3803150) Homepage Journal
    In 1994, I took a job at a bank in Oklahoma. My boss at the time had the attitude "We're a bank, we pay for software".

    Then I showed him screen. Suddenly the light went on in his head-- "Hey, I don't have to use 2 phone lines and 2 modems to get 2 shells at work!" To him, it was the greatest thing since sliced bread.

    After that, he didn't have any problems letting me install emacs. :-)
  • so we can 0wn them. ;-)

    seriously, any unix admin worth their paycheck isn't using unsecure telnet or ftp.. i sure know i'm not. (and i don't get paid enough)

    • I hear this a lot, that you should never under any circumstances run telnetd. If it's firewalled off so it's only accessible inside a trusted network (my network at home) is there any security issue (eg if an attacker gets into one machine could they use telnet to exploit another)
      • the problem with telnetd is that user id's and passwords are sent in clear text. anyone with a sniffer on your network will be reading them as easily as reading the newspaper.

        firewalled off or not why take the risk? ssh does everything telnet does and more (like X and port forwarding, file transfers with scp). everything that goes through is encrypted.

        the risk goes up even further if you're happily using an unencrypted network at home, behind a firewall. anyone sitting outside your house can watch you telnet from box to box! even encrypted 802.11b transmissions can be broken with time.

        why take any chances when protection is so simple? it's also good to simply practice safe computing.
  • openSSH (Score:5, Insightful)

    by MattW ( 97290 ) <matt@ender.com> on Monday July 01, 2002 @05:07PM (#3803155) Homepage
    OpenSSH is far more widely used than any commercial variant. You'd be hard pressed to find a fortune 500 company that isn't using it somewhere. Almost any provider of IT services or network services uses it, unless they have no *nix boxes at all and provide no services on anything other than a windows platform. Try a quick survey of network security companies and ask how they do remote access/filetransfer -- no matter how big, scp/ssh will be the answer, and it will be openssh for a majority of them.
    • Re:openSSH (Score:2, Informative)

      by Bloem ( 528155 )
      Even though recently some security issues are found in openssh, it can be regarded as one of the more stable and secure implementations of the ssh protocol.

      Make sure that when openssh is used, it is configured properly.
      e.g.
      - no root login
      - SSH2 instead of SSH1
      - use login with key instead of passwords

      There are more configuration options, please read the man pages for those.
      • >use login with key instead of passwords

        This is harder than it should be, to convince semitechnical people that it is more secure, or secure at all.

        It's very, very hard for some people to get their brain around key-based authentication, or the concept that a password scheme could be weaker.

  • Ssh communications. (Score:4, Informative)

    by Anonymous Coward on Monday July 01, 2002 @05:07PM (#3803157)
    Most businesses goes with SSH communications, www.ssh.com. They also have a low-memory-fotprint version, ipsec, tunneling software and some other stuff.
    • "SSH is now the de-facto standard for remote administration over the Internet. It is used in more than 50 countries by thousands of organizations, including e.g. MCI, Stanford University, Lawrence Livermore National Laboratories, and NASA."
    • by alsta ( 9424 )
      Well, Solaris 9 has an SSH implementation which in fact is OpenSSH. They've modified a few things though; such as the reported version string;

      Escape character is '^]'.
      SSH-2.0-Sun_SSH_1.0
      ^]
      telnet>q

      Everything else (config files, library dependencies etc.) speaks of OpenSSH so much that there is no other possible option. Sun probably took OpenSSH and modified a few things and released it as their own, as they are allowed to by the BSD license.

      These configure options should get you an identical setup to that of the layout on Solaris 9;

      CC=cc \
      CFLAGS="-g -I/tmp/foo/include" \
      LDFLAGS="-L/tmp/foo/lib -R/tmp/foo/lib" \
      ./configure \
      --prefix=/tmp/foo \
      --bindir=/usr/bin \
      --sbindir=/usr/lib/ssh \
      --localstatedir=/var/run \
      --libdir=/usr/lib \
      --includedir=/usr/include \
      --mandir=/usr/share/man \
      --with-ssl-dir=/tmp/foo \
      --sysconfdir=/etc/ssh \
      --libexecdir=/usr/lib/ssh \
      --datadir=/usr/lib/ssh \
      --with-pid-dir=/var/run \
      --with-prngd-socket=/var/run/prng-socket \
      --with-zlib=/tmp/foo \
      --disable-wtmp \
      --disable-utmp

      The $CC variable is to build with Sun Forte, substitute with gcc as you please. Note the LDFLAGS and CFLAGS though. This configure expects to find zlib and openssl headers in /tmp/foo/include and _static_ libraries /tmp/foo/lib. Don't dynamically link with anything unless it's available on the system itself when it comes to Solaris. You'll introduce nasty inter-dependancies which you'll regret in the long run. Trust me, installing shared libraries on 500 machines isn't that fun.
  • by edyu ( 259748 ) on Monday July 01, 2002 @05:08PM (#3803164)
    Both SSH (Company) and F-Secure sells commerical products of SSH. But maybe if you word it differently, your management should accept OpenSSH since it is being used by many companies. My company (a smaller 100+ person) uses OpenSSH extensively.
  • by SquadBoy ( 167263 ) on Monday July 01, 2002 @05:09PM (#3803170) Homepage Journal
    http://www.openssh.org/users.html

    Also Nokia's IPSO (on their Checkpoint based firewalls uses openssh.
    As you can see Sun uses it. Good enough. I thought so.
  • Data Fellows... (Score:4, Informative)

    by Helmholtz Coil ( 581131 ) on Monday July 01, 2002 @05:09PM (#3803176) Journal

    ...has a version of SSH [datafellows.com] available for Unices, Windows, Macs, even the Nokia 200 [datafellows.com]. Don't know how good it is, but they've got a fair amount of info on the site.

  • F-Secure SSH (Score:5, Informative)

    by Medieval ( 41719 ) on Monday July 01, 2002 @05:10PM (#3803182) Homepage
    F-Secure makes a rather kick-ass line of SSH products. We use them in production here (major tire manufacturer.), and it is FIPS 140-1 compliant. The client-side portion is pretty schweeeeeeet (esp the Windows client), even if you don't use the server portion.

    http://www.f-secure.com/products/ssh/

    List of platforms:

    Server
    All major Unix platforms; Solaris, Linux, HP-UX, AIX, BSD
    Windows 2000, Windows NT 4.0

    Client
    All major Unix platforms; Solaris, Linux, HP-UX, AIX, BSD
    Windows XP
    Windows 2000
    Windows NT 4.0
    Windows 95
    Windows 98
    Windows ME
    MacOS
    Nokia 9200 Series Communicators
    • Re:F-Secure SSH (Score:2, Informative)

      by Anonymous Coward
      We used f-secure on half our DNS caching servers. When our NOC started migrating to Linux workstations, scp (secure copy) would not work from the workstation to DNS server. Apparently was an underlying f-secure issue using SSH-1 or something (their statements, many e-mails). Anyway, for this *paid* support, we received little help on some type of resolution.
      OUR SOLUTION....We scrapped f-secure and went OpenSSH (BSD version anyway). We been very happy, and have save thousands of $$ in maintaince fees. Example: The recently posted problem with SSH had a newsgroup workaround posted within the same day. I tested the workaround and upgraded our machines by that evening. Anyway, that's truly....schweeeeeet!
    • hmm...

      I wish there was a client for Nokia 9110 that doesn't costs a fortune...

  • in fact, have them buy the cd. that'll lend some weight to your argument

    https://https.openbsd.org/cgi-bin/order [openbsd.org]

    besides, it's the right thing to do. =)

    -Triumph
  • Other thoughts (Score:3, Insightful)

    by tsetem ( 59788 ) <tsetem&gmail,com> on Monday July 01, 2002 @05:10PM (#3803186)
    Not sure what the requirements are, but if you are looking for secure access, you may want to consider a web-based file repository with an SSL front-end on it. You could have your choice of Apache & mod_ssl, or Stronghold (Apache derivative)

    If using OpenSSH is questionable, using the #1 webserver shouldn't be. If Apache isn't proven or reliable in their eyes, then you have a really tough uphill battle.
  • by gr8fulnded ( 254977 ) on Monday July 01, 2002 @05:12PM (#3803198)
    I had the exact same situation about 6 months ago. I won, sorta. I simply said our industry is going through hard times right now and using OpenSSH will save your $500k in licensing fees.

    We ended up compromising. They wanted vendor software, I wanted free. For the mission critical systems, we chose FSecure (fsecure.com) and for the high-importance and below (to include desktops), we went with OpenSSH.

    Worked out well. With FSecure we also purchased Windows clients for the developers and if anything ever happened, they had the support they were looking for the vendor software. With everything else, OpenSSH did the job along with PuTTY on the peasants computers.

  • SSH Is Proven (Score:2, Interesting)

    by skinney ( 395862 )
    I am shocked that people think that SSH (OpenSSH) is not a industry standard. Here is a good client for windows. And of course you can get the server for free here. [openssh.org]

    ~Shane
  • Our company had similar requirements:

    1) Encrypted file transfer
    2) User authentication
    3) chroot jail environment

    After initally looking at F-Secure's ssh server for Windows to match the system standards. We found out that certain SSH subsystems (namely sftp) we not 100% compatible with all clients. I'd put the openssh code up against commercial offerings if you can spend a little bit of time configuring.

    In the end we waived standards and used Linux, openssh+openssl+ldap. It did require patching the sftp subsystem for chroot access that was obtained off of the openssh mailing list. This does require a suid executable, but since our customers are [semi] trusted, the risk of them smashing the stack is manageable.

    Customers can now sftp or scp in and are rooted to the ~username directory. At present, implementation has be as easy as our dedicated line FTP customers. Ironically, we recommend commerical SSH clients...
  • Lots of Options (Score:3, Informative)

    by Anonymous Coward on Monday July 01, 2002 @05:14PM (#3803208)
    There are several options for commercial SSH vendors. I found myself in a similar position a couple of years ago. I worked at a company that provided 24/7 security support to hundreds of companies, and _had_ to have a commercially supported SSH for both insurance and customer relation purposes. We started out using F-Secure [f-secure.com], but the licensing and support was terrible. On top of that we found out that F-Secure simply licensed SSH.com's code and rebranded it. We worked a fantastic deal with ssh.com [ssh.com] that allowed us to deploy SSH enterprise wide. On top of the good deal, we found the support to be excellent. At one point we needed some LDAP integration done and SSH.com had it done by the next release. I have also found SSH.com to be better security wise (since they do this to make money) than OpenSSH, check their track record. Anyhow, F-Secure, SSH.com and a couple of other companies offer SSH commercially. Good luck.
  • by dsb3 ( 129585 )
    > What large organizations are implementing SSH?

    All of them.
  • by mesozoic ( 134277 ) on Monday July 01, 2002 @05:16PM (#3803222)
    OpenSSH is by far the best SSH implementation available; the fact that it's freeware is a horrible reason not to use it. Explain to your employers that for a fee (and probably a smaller fee than most corporations would want) the OpenSSH team would most likely provide your company with expert support and services.

    Don't to roll over and allow your firm to adopt a second-rate (and more expensive) security product simply because they don't trust open source. The answer to your problem, as uncomfortable a situation as it may be, is to try to inform the higher-ups of why they're misguided (without losing your job ;D).
    • Don't to roll over and allow your firm to adopt a second-rate (and more expensive) security product simply because they don't trust open source.

      If however, they INSIST on a commercial version, please let me know and I'd be happy to take their money. My soon-to-be-created company will charge per copy precisely their budget divided by the number of copies they want.

      Support is extra, of course. But source is included.

      W
  • by Marx_Mrvelous ( 532372 ) on Monday July 01, 2002 @05:16PM (#3803223) Homepage
    They have .depot's available for 11.00 and 11i, and they are officially supporting it. That's a commerical OS/backing.
  • Usage Stats (Score:4, Informative)

    by rwash ( 16296 ) on Monday July 01, 2002 @05:16PM (#3803226) Homepage
    [openssh.org]
    http://www.openssh.org/usage/index.html

    The OpenSSH team has put together a great page with a number of different usage statistics for SSH.
  • Kerberos (Score:2, Insightful)

    by typedef ( 139123 )
    While it would be somewhat more complicated from an administrative and support standpoint to implement, a 'Kerberized' ftp daemon (I believe that one comes with the stock MIT KerberosV distribution) could possibly be a solution to your problem. Kerberos, while technically 'freeware' has been around for quite some time, has existed in several major UNIX distributions, and is used quite extesnivly in many major orginizations. Otherwise, if security is a concern, why not just set up a VPN between the client and your company and have the FTP go through that?
    • Otherwise, if security is a concern, why not just set up a VPN between the client and your company and have the FTP go through that?

      One compromised machine or one inside operator and the whole house of cards comes crashing down.

      Kerberos is nice IFF you enforce strong passwords. Session integrity is only protected by the password (via string-to-key and excryption of your ticket-granting ticket and associated session key). Kerberos is very suceptable to ofline attacks if you have weak passwords.

  • by Bagheera ( 71311 ) on Monday July 01, 2002 @05:19PM (#3803251) Homepage Journal
    The company I work for ("a little hardware vendor in the Valley") switched from the Commercial ssh client and server package to OpenSSH for all of our servers. OpenSSH proved more robust and easier to support - not to mention much, much, less expensive. And yes, I'm including the "cost" of our SysAdmin's time and the time of the person who manages distribution of our 'approved' OpenSSH package.

    There really is no reason to use a commercial product unless the management is stuck on the "We need someone to sue if it breaks" business model of software acquisition.



    • There really is no reason to use a commercial product unless the management is stuck on the "We need someone to sue if it breaks" business model of software acquisition.


      SSH, Inc.'s Windows server offering had much better system integration than any of the Windows OpenSSH projects. Granted - this may no longer be the case (last I looked at this issue was over a year ago).
    • Using commercial as a synonym for proprietary isn't logical. There's plenty of Open Source applications which have been produced for the primary aim of making money (RPM, Zope) and there's plenty of closed soruce apps which are produced for non-commercial reasons (eg, PowerArchiver back when it was called easyzip). The word proprietary is a much more accurate description of the software.
  • by unformed ( 225214 ) on Monday July 01, 2002 @05:20PM (#3803259)
    ala FreeBSD, OpenBSD (One remote hole in the default install, in nearly 6 years!) , OpenSSH, Apache, etc.

    Instead, let's use proprietary "secure" software, ala Win2000, IIS, etc.
  • SSH over OpenSSH? (Score:2, Insightful)

    by StupidKatz ( 467476 )
    While I can respect the company's policy of only wanting to deal with "respected and proven" commercial software, many commercial apps critical to secure operations are not "proven". Even SSH is relatively far behind the development curve of OpenSSH, its open-source counterpart. Nor is it in use in as many types of environments.

    It may sound silly to suggest it again, but consider mentioning OpenSSH in your spread of possibilities. Even though it did have a possible remote root exploit exposed recently, look how fast working updates and/or workarounds were released. You'd be very hard pressed to find that in a commercial product.
  • ...use IPSEC based VPN's. Most firewals will do this, just make sure they use a common key exchange method (i.e. don't use anything from Novell)
  • SSH is the original (Score:4, Informative)

    by ddstreet ( 49825 ) <ddstreet.ieee@org> on Monday July 01, 2002 @05:23PM (#3803280) Homepage
    The SSH protocol was created by ssh.com [ssh.com], and in the past they have tried to stop openSSH [openssh.com] from using the SSH name (see here [slashdot.org] and here [slashdot.org] and here [openssh.org]). The SSH product from ssh.com was created before any SSH standard existed, and its protocols became the defacto way to communicate securely. It was (and according to the license agreement [ssh.com], still is) available for free (as in beer) for non-commercial and educational use. It's available at their ftp site [ssh.com] or a mirror [ssh.com].

    If you want a "industry proven and supported [ssh.com]" product that supports SSH protocols, then the original SSH [ssh.com] is what you want, but you'll (obviously) have to pay [ssh.com].

  • So how do they feel about Apache? I mean, IBM will sell it to you can IBM HTTPD, but it's still Apache. Or Java? Or... grrr
  • by hexile ( 589538 )
    Sun themselves recommend OpenSSH. Just search http://www.sun.com.

    Some notable links:
    http://www.sun.com/blueprints/0102/configs sh.pdf
    http://www.sun.com/blueprints/0701/openSSH .pdf

    The scripts for an automated package creation have been very useful for me over the past few months, as OpenSSH has blazed through the 3.x versions.

  • by RedRun ( 204496 ) on Monday July 01, 2002 @05:30PM (#3803328) Homepage
    Ok, this is what you do:

    Register a company called "Secure Products Inc.", and make a quick website, fake some letterhead, etc. Then, tell your boss you found a great SSH product from Secure Products for only $50 per seat. Then, download the newest version of OpenSSH, change the name to SPISSH and watch the $$$$ roll in!

    Word.
  • by Anonymous Coward
    I have run into the same situation myself, where the vendor I need to work with wants to transfer critical, sensitive or otherwise private data across the internet, using the very insecure FTP protocol.

    I have suggested SSH to these vendors and each time they cite reasons relating to their use of Microsoft Windows (often a managed server at some hosting company like AT&T), or their refusal to use non-mainstream-commercial software. They also tend to try to argue that FTP is good enough, and that the law doesn't require anything more secure. As we all should know, this is just plain senseless, and dangerous.

    In my hunt for an alternative that would be acceptable to them as well as me, AND would be able to be automated, I realized that good old HTTP over SSL (HTTPS) would work just fine for transferring the data. Not only would it be secure enough (at 128-bit) but I could automate the entire thing with OSS tools from my side, and they already had everything they would need to make it work on their end under Windows.

    With just a little configuration on each end, and a simple little perl script, we have a secure transfer mechanism.

    In our case our internal policy states that we initiate all secure data transfers from our side so making our transfers "bi-directional" was easy, but for others who do not have this policy, or where it would be inappropriate, it is quite simple to set up an http server on the local side to handle inbound transfers, even on a Windows server/host.

    There are of course other possibilities including using a TLS enabled ftp client/server, and they all come with other considerations including some relating to compatibility. I highly suggest that you personally review each of the alternatives yourself and do not rely purely on the advice gleaned here on Slashdot, as accurate (or not) as it may be.

    Hope this helps!
    -Anon
  • Solaris 9 comes with a slightly modified OpenSSH (according to Sun).
    The only commercial Unix ssh server that I'm aware of is from SSH.com
    (it is resold be several companies like F-Secure IIRC).

    Compaq^WHP supplies SSH.com's ssh for Tru64 Unix (free download from
    Compaq's site, and I think will be included with Tru64 5.1B).
  • SSH is a proprietery product from SSH.COM. It is an outstanding technology that has been adopted by the open movement and SSH "tolerates" Open SSH. However, all other commercial products must license it from SSH. So, if you must get it from a commercial vendor then why not get it from the horses mouth, as it were.

    Now, to answer your question regarding Open SSH specifically. The only major and well known company that I know for sure that uses Open SSH is Cisco. There are certainly many others but, there are probably few who use it as a matter of policy. But, that doesn't mean that their engineers, having half a brain, haven't all acquired a copy and rely heavily on Open SSH. Part of the problem with free software is that it doesn't show up on the radar unless it is used very heavily but, that doesn't mean that it isn't used by many.

    You've got a tough sell ahead of you as you must sell mind share, which is very difficult. It's far eaisier to sell SSH on technical merit but, that's already been done for you. To add further insult, if anyone does take you seriously and checks into Open SSH they will likely find a couple of recent vulnerabilities which, although already fixed, won't help your arguement.

    I'd say let it go. If they want to pay for SSH then let them. Comfort yourself in thinking that that money will be used by SSH to advance the product and some of those advancements will make it into OpenSSH too.
    • by akeru ( 15942 )
      well, you are, in part, mistaken. SSH is a proprietary product from SSH.com (I don't know what the exact company name is ATM) and while it is an outstanding technology (well, v2 of the protocol is, v1 . . . not so much) it was not "adopted" by the open movement. SSH (the company) has had the protocol ratified as a standard, and OpenSSH is an implementation of that standard (well, Internet-Draft at the moment) and SSH.com "tolerates" OpenSSH only in that it has no alternative as it initially submitted SSH to the IETF. So if they want it to be a standard, they can't inhibit other implementations of said standard. This is also the reason they lost (and horribly, I might add) their battle over the "SSH" trademark. SSH is the name of a standard protocol (at their own doing) so the company lost the right to use it exclusively.
    • Never get the facts get in the way of a good troll, eh?

      The truth of the matter is that back in the early days of SSH, the world was entirely SSH.COM (now F-Secure). That's because there was noone else. SSH 1.x was all we had, and it was free (for non-commercial use, after 1.2.something).

      It's profoundly clear that the large majority of businesses are switching to OpenSSH. The numbers prove it (check out openssh's statistics, posted here several times). Why? Because the old SSH 1.x installations are steadily dying, and people are forced to perform a semi-major upgrade. It's clear they're choosing OpenSSH. If you read the statistics in fact, it appears that the number of F-Secure installations is dropping. (not couting F-Secure 1.x, which is dropping like a stone).

      You may think "oh, big conservative companies want a commerical product". Take for example UBS Warburg. A mega-huge conservative financial institution. They use OpenSSH whever possible ("as a matter of policy" to use your words). In fact, several of their employees are involved in OpenSSH development. I used to work for a hosting company, and there were other fiancial institutions that used OpenSSH. Of course not just banks liked OpenSSH. We had very few requests to support F-Secure.

      They're by far not the only ones. Your "horses mouth" argument is way off the mark, too. The vast majority of development is going on in the OpenSSH world, not the closed proprietary world of F-Secure. Oh, and F-Secure's SSH isn't without a recent hole [f-secure.com] either.

    • I thought Cisco charged for SSH on the routers?
  • And has docs on it [sun.com]. Use things like sendmail and bind (DNS) as examples of opensource in practice. Also, show them the prices for a commercial SSH implementation on a large scale. Very little beats the bottom line of free, as in beer/books.

  • Email me, I can give you names and number for people using OpenSSH in a corporate envionment. (I am posting this to the main commments since the article poster doesn't have an email address).
  • I am willing to bet that when they said "freeware" they were thinking TuCows [tucows.com] and fly-by-wire or 13-year-old VB h4x0r in his basement.

    I'm sure your boss(es) need a good clue-bat to the head and they'll be fine.
  • by Ogerman ( 136333 ) on Monday July 01, 2002 @05:46PM (#3803437)
    The response I received stated that they don't like to use freeware, but only consider industry proven and supported software.

    Then your company needs to fire its IT management staff since it is apparent they have absolutely no idea what they're talking about. In the meantime, you can tell them that OpenSSH is NOT Freeware. I wouldn't trust freeware either. The difference? Freeware is typically closed source software that the authors refuse to release to code to because they think they're really "eleet" or some similar childish reason. I would also ask you: if you're a talented geek (assumption), why are you working for some lame company that refuses to touch Open Source software? Go somewhere where you're gonna make a difference. If you have the skills, you'll find plenty of jobs doing what you'd really like to do.
  • The "security" admin there wanted to load F-Secure on everything.
    Except he didn't know how to load it. I was tasked with "implementing SSH..."
    I loaded OpenSSH on all the Sun boxes (90+). Loaded up putty for all the developers and started shutting off telnet/ftp.
    The F-Secure sales rep called me to see "how things were going".
    I told him we were going to go with OpenSSH. He asked about support... I laughed at him. 2 weeks later a major hole surfaced in SSH
    (OpenSSH was not vulnerable to this one.) and F-Secure was the LAST vendor to come out with a fix, ala 2+ weeks later.

    I have OpenSSH running on my HPUX box, all my Sun boxes, all my Linux boxes, and of course my OpenBSD boxes.
    If OpenSSH is good enough for Sun/HP/Redhat it ought to be good enough for your managers. If not it might be time to go Bofh [ntk.net] on them....
    Just load it on there and then tell them you *didn't realize* it was already on there.... Then stuff them in a tape safe...
  • Both OpenSSH and SSH are industry proven and supported software. SSH [ssh.com] is supported by the original author of the protocol [ssh.com], Tatu Ylonen, among others. OpenSSH [openssh.com] is supported by acknowleged Open Source security experts including Markus Friedl, Dug Song, and Theo de Raadt.

    The version of SSH that Sun is shipping with Solaris is in fact OpenSSH. Sun is not trying to hide this, they are proud of shipping it because it is an excellent program.

    Most major insurance companies run SSH (if they are Microsoft shops) or OpenSSH (if they are not). Most hospitals run OpenSSH.

    I use both products. Support is superb for both; but SSH.com has friendly, personable phone support while the OpenSSH support comes mostly from Usenet and Email (and can be fiery if you ask exceptionally stupid questions). OpenSSH fixes bugs faster than SSH.Com, but both products have had about the same number of problems, and all have been quickly and effectively resolved.

    Popular clients for windows include putty [greenend.org.uk] and Teraterm SSH [zip.com.au]. Make sure you get a recent version, however, older versions of those programs use versions of SSH ( v 1.5) that have known bugs.

    If you are dealing with a company that thinks commercial software is "better" than "freeware" you should be careful how you approach this project. If there is a single person who has created this mindset, that person is likely to be both powerful and not very analytical - a dangerous combination.

  • You've asked the smaller question with a really awesome example (OpenSSH is one of the highest quality software products available, IMHO).

    However, the larger question is this: how do you convince your boss that you should be allowed to use lots of free software off the net. The answer is you should not, and he should not approve such a thing. What you should be doing is picking a vendor that will do things like chase down security updates, while also providing you with the kinds of features that you need.

    Of course, this brings into question the entire spectrum of software that you run. Should you switch OS vendors to someone who embraces Open Source Software (e.g. a Linux vendor like Red Hat, Caldera, SuSe, etc.).

    If you need high-quality software with the latest feature-set, you should be looking at who will give you what you need and support it well.

    Can of worms you say? Well, yes but when you start talking about Linux these days you have a lot of amunition. IBM is shipping Linux-based systems. Everybody and his brother is using Linux-based servers in production (unless they're using BSD :)

    OpenSSH is hard to argue against, and you'll probably win that battle hands-down. But what happens when you want remote management via VNC or OpenLDAP has some features you want or you need a quick-and-dirty database and don't want to spend $thousands?

    Get an OS that comes with the best software already installed. Get Linux.
  • wrong question.

    the correct question is, "should i get a new job?" and the answer is yes.

    i'm totally serious. it's as if 100 or so years ago you worked at a overland transport company that said, "ah, that mechanical train thing is never going to catch on, i'm sticking to wagons!"

    let your current employer waste their time and while you humor them with whatever they think they want to hear, go find a more sane place to work while you have the luxury of time.
  • they don't like to use freeware, but only consider industry proven and supported software.

    What, do they live under a rock? You'd be hard pressed to find another free software project used _more_ than OpenSSH.

    Maybe you should forward a note to your CEO about how your clueless IT department is needlessly racking up support and licensing costs, while remaining ignorant of common IT practices.

    -pmb

  • I've been with my present employer since Oct. of 1999. Every time we have a meeting where we discuss ways to accomplish some task I waited for an opportunity to say, "I could write a shell script to do that" or "We could do that with a Linux box". Early on it always got a big laugh. Then my technical lead started saying, "We could do that with a shell script." Now they're asking questions about using Linux for server consolidation. Some things take time. Patience my young apprentice.
  • but only consider industry proven and supported software.

    ...the thin, whiny sound of an incompetent, bumbling, empire-building middle manager, easily identified by the unhyphenated buzz-phrase "industry-proven" which is part of the Management 2.0 Service Pack upgrade along with "customer-focused" and "memory-hungry."

    It really is unfair to have such a staggering advantage over the competition.

    No, please. PLEASE go overpay for your "industry-proven" version of the exact same thing everyone with a clue already has. Just don't lay off anyone when your budget runs out.


  • What large organizations are implementing SSH?"


    Cisco Systems uses SSH extensively. You can find SSH supported in some of their commercial products. And internally, SSH is becoming one of the standards for remote access. It might be interesting to note that they use a combination of SSH2 from SSH, Inc AND OpenSSH with both being officially sanctioned solutions.
  • My company's IT department is trying to set up secure FTP with a vendor

    To secure FTP traffic, I highly recommend SafeTP [berkeley.edu] from the folks at Berkeley. SafeTP is an RFC 2228 [ietf.org] compliant FTP Security Extension that uses Public Key Crypto to authenticate and secure the link.

    SafeTP [berkeley.edu] is supported under Unix / Linux as well as Windows 95/98/ME/NT/2000/etc. Source code for Unix and compiled code for Windows is available free of cost.

    This quote from the Berkeley folks may be useful:

    How is SafeTP better than existing FTP systems?

    First and foremost, SafeTP secures the FTP control channel to ensure the privacy of the user password, thereby providing secure authentication. This in itself is a huge improvement over the traditional FTP protocol, which sends user passwords (and everything else) in the clear (see RFC 959 [ietf.org]).

    SafeTP protects the control and data channels against a number of attacks, including eavesdropping attacks, modification attacks, and replay attacks. SafeTP provides this security through a public-key crypto-system based on the ElGamal, DSA and TripleDES security algorithms, and is implemented as an RFC 2228 [ietf.org] security mechanism. The security negotiation is similar to the one used by ssh and SSL - see the X-SafeTP1 protocol specification [berkeley.edu] for details.


    SafeTP has several advantages over most existing FTP security systems (such as kerberos or ssh tunnelling):

    • Transparent - the windows client automatically and transparently secures FTP connections from within the OS - which means the user can continue using their favorite FTP client, without ever having to think about it again. No need to tweak any settings in their client, no need to setup any tricky proxy or port forwarding software.
    • Interoperable - the client software (windows and UNIX) automatically works with both secure and insecure (legacy) servers. The server software always accepts secure connections, and can be configured to allow or disallow insecure connections.
    • Data security and integrity configuration - SafeTP always secures the control channel (which includes the username/password login sequence), but the client can be configured to provide privacy, integrity and authentication for the transferred file data as well. The user may also choose to disable data encryption to maximize performance.

    We have found SafeTP [berkeley.edu] to be both user friendly and expert friendly. We have been successfully using it now for several years. It works well behind firewalls. The code is both well written and stable.

  • Sprint PCS 3 OpenSSH (Score:2, Interesting)

    by NitroWolf ( 72977 )
    I work in a pre-field lab environment, where we make sure all our equipment going onto our network isn't going to blow anything up.

    All of my machines are standard with OpenSSH now, and I know that all the new machines coming in are required to have SSH in place of Telnet... and OpenSSH is the defacto standard, although we will accept a commercial implimentation if the vendor provides it.

    Anything Sprint PCS provided, though, is OpenSSH. Telnet as been officially "banned" from all new equipment, even if people are breaking this rule (much to my chagrin) on occasion.
  • Check out The Written Word [thewrittenword.com].

    They have builds of OpenSSH (and tons of other free software) for a variety of UNIX platforms, and they offer commercial support for them. I used them at my last employer, and was extremely satisfied with them. On several occasions they integrated or wrote fixes when I came across bugs, and submitted their fixes upstream to the maintainers. Their response was also much faster than the maintainers.

  • Sun Professional Services uses SSH to access the machines they are administrating. I guess if it's secure for all their customers, it should be good enough for the application in question too.

    - Hubert
  • I worked for CNN.com for two years (1998 - 2000). We used SSH there to transfer news feeds between servers as part of our automated processing. A template would generate the data (XML, html, JavaScript, whatever), and then a Perl or shell script would scp (secure copy, a part of ssh) the file to the remote server using an ssh-agent.

    When I left CNN, I went to a startup called ZapMedia. It was a much smaller company, but we used SSH for all communications to our production boxes (which were colocated at Exodus outside of our company LAN). We even did remote CVS checkouts over SSH as part of our code release process. The use of SSH was completely secure and worked very well.
  • We are (an unnamed) large computer services company and we use openSSH but the licence made our legal department throw fits. The wording in it is strange and basically says "I'm not sure what's in this code and there may be things that are or are not someone else's intellectual property but if anyone comes after you legally than I'm out of it..."

    Before that we used F-Secure's SSH as a commercial version. It works great but is clearly more expensive than FREE.
  • by stirfry714 ( 410701 ) on Monday July 01, 2002 @10:04PM (#3804968)
    This is one of those situations where I've actually been pleasantly surprised by both the commercial (SSH.com) and non-commerical (OpenSSH) products. I've used both, almost interchangeably, and like them both. It's really a toss-up for me.

    Some people might point to the recent OpenSSH security holes trying to discredit them, but look at how quick the turnaround on patches was.. amazing.

    One thing I did want to point out was the SSH.com Windows client. I really like it. It might not be worth the money, but if you fall into one of the categories where you get a free license (allows university use and non-commercial use according to their website), it's quite good. I especially like the ease in opening additional sessions or secure file transfer, etc. Worth checking out..

    (And definitely don't use the TeraTerm SSH client. It's still SSH version 1, and is just a hack on top of TeraTerm... never seemed like the greatest solution to me, even if it did work)
  • ... they don't like to use freeware, but only consider industry proven and supported software.
    If a person this clueless is in charge of security, it's not a good sign for the company.

    You cannot find anything commercial that is more proven or better supported than OpenSSH. There may be commercial packages that are as good -- although I don't know of any -- but there can be none that are better. Support from commercial companies is, too often, a joke.

    Case in point: very recently a bug was discovered in OpenSSH: if you used a certain form of challenge-response authentication, a remote compromise may be possible. Within days of the bug being announced, there was a workaround; and versions post-3.3 are not affected since they UsePrivilegeSeparation by default. This is the only significant bug I can remember off-hand.

    In any case, SSH is a commercial product and is done by Tatu Ylonen, who was the original SSH guy; OpenSSH is the free version that the OpenBSD guys forked when SSH went commercial.

  • I've been working at dig.com since April, and we use OpenSSH on all our unix boxes. We use a bunch of other free software, and nobody thinks it's risky or anything. We could certainly afford commercial software if it provided anything we couldn't get in free software.

    As it turns out, the prevailing attitude is that with commercial software we have to involve the vendor every time we want to do anything remotely unusual. If we improve the tool, the vendor probably won't support it. If the vendor improves the tool, they will probably require more money and a needlessly complicated upgrade for us to benefit from it.

    Stand up to your managers. Don't just tell them that Free Is Better, show them.

WARNING TO ALL PERSONNEL: Firings will continue until morale improves.

Working...