SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH was designed as a replacement for the Telnet protol due to Telnet's inability to protect data against "man in the middle" attacks. The encryption used by SSH provides confidentiality and integrity of data over an insecure network, such as the Internet.
For convenience, ease of administration and integration into other products (such as DELL EMC DPA) a DD may need to be accessed programmatically without an administrator giving a password every time, or insecurely storing the password on some text file. That is where SSH key authentication comes into place.
SSH requirements
The server's host key is not cached in the registry. You have no guarantee that the server is the computer you think it is. The server's rsa2 key fingerprint is: ssh-rsa 1024 7b:e5:6f:a7:f4:f9:81:62:5c:e3:1f:bf:8b:57:6c:5a If you trust this host, hit Yes to add the key to PuTTY's cache and carry on connecting. If you want to carry on connecting just once, without adding the key to the cache, hit No. If you do not trust this host, hit Cancel to abandon the connection.
Click Yes
Generate an SSH key.
#### Recommended key type is "rsa," and is the only one that works with DDOS 6.0 and later
# ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/root/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /root/.ssh/id_rsa. Your public key has been saved in /root/.ssh/id_rsa.pub.
#### Keys of type "dsa" will also work on DDOS 5.7 or earlier, however, this key type is no longer recommended
# ssh-keygen -t dsa
Generating public/private dsa key pair. Enter file in which to save the key (/root/.ssh/id_dsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /root/.ssh/id_dsa.
The DDOS Command Reference says to use the " d
" option instead of "-t dsa
." Either one will work on DDOS, but " d
" does not work on many Linux distributions.
Use the blank passphrase option to bypass the Data Domain system password requirement when running scripts.
Note the location for the new SSH key on the "ssh-keygen
" command output. It is stored under the user's $HOME directory below .ssh/ as a file named id_rsa.pub.
Add the generated key to the Data Domain systems access list.
# ssh -l sysadmin 168.192.2.3 "adminaccess add ssh-keys" < ~/.ssh/id_rsa.pub
The authenticity of host '168.192.2.3(168.291.2.3)' can't be established. RSA key fingerprint is f6:36:6e:32:e1:2d:d9:77:40:7e:0e:f8:5f:32:8d:0a. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '168.192.2.3' (RSA) to the list of known hosts. Data Domain OS 0.31.0.0-152384 Password: sysadmin_password
Test functionality.
# ssh sysadmin@168.192.2.3 "df -h" Data Domain OS Resource Size GiB Used GiB Avail GiB Use% Cleanable GiB* ------------------ -------- -------- --------- ---- -------------- /backup: pre-comp - 50.0 - - - /backup: post-comp 4922.3 2.7 4919.7 0% 0.0 /ddvar 78.7 0.5 74.2 1% - ------------------ -------- -------- --------- ---- -------------- * Estimated based on last cleaning of 2010/02/02 06:00:59.
You may also pass an entire script of system commands in a file to the device. This is done by running a command to point to the specific file containing the list of commands:
# ssh sysadmin@DDR < FULL_LOCAL_PATH_TO_SCRIPT_TO_RUN_ON_REMOTE_DD
This allows an operator to create a list of commands on a remote host and then run them all at once over SSH.
Configuring the system to log in without using a password: Windows Systems (PuTTY)
Install the SSH PuTTY tools: PuTTY, PuTTYgen, and Pageant, on the Windows system
Create a PuTTY session.
Enter Auto-Login username.
Create a PuTTY key.
Add the key in the Data Domain system command line.
adminaccess add ssh-keys
Attach the key to PuTTY.
Open the session.
admin_name@company.com Last login: Thu Feb 4 10:51:10 EST 2010 from 168.192.2.3 on pts/2 Last login: Thu Feb 4 18:56:14 2010 from 168.192.2.3 Welcome to Data Domain OS 0.31.0.0-152384 ----------------------------------------- #