Netinfo Security ›› 2018, Vol. 18 ›› Issue (1): 45-51.doi: 10.3969/j.issn.1671-1122.2018.01.007

• Orginal Article • Previous Articles     Next Articles

Research on Establish SSH-based Trusted Channels

Bo FAN1(), Runkai YANG2, Lin LI2   

  1. 1.China Electronics Standardization Institute, Beijing 100007, China
    2.Beijing Jiaotong University, Beijing 100044, China
  • Received:2017-12-01 Online:2018-01-20 Published:2020-05-11

Abstract:

The security of existing secure channel technologies can be improved when being integrated with TCG remote attestation techniques. This paper proposes a practical approach to establish SSH-based trusted channels, denoted as trusted SSH. From the security point of view, trusted SSH not only achieves the authentic binding of the platform state information to the SSH secure channel, but also retains the privacy of the platform state information. From the functionality point of view, trusted SSH has the following features: attestation flexibility, backward compatibility and scalability. It is reflected in the aspect that any session key exchange algorithm used in SSH can be seamlessly used in Trusted SSH. These characteristics of security, functionalities and scalability are achieved in an efficient way. We also implement trusted SSH based on open SSH for evaluating its other features.

Key words: SSH, trusted computing, remote attestation, trusted channel

CLC Number: