SSH2 Usersguide
SSH2 Usersguide
User’s Guide
THIS PAGE INTENTIONALLY LEFT BLANK
GEORGIA SOFTWORKS
SSH Server
ii
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
THIS PROGRAM IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
COPYING:
WHILE YOU ARE PERMITTED TO MAKE BACKUP COPIES OF THE SOFTWARE FOR YOU
OWN USE AND PROTECTION, YOU ARE NOT PERMITTED TO MAKE COPIES FOR THE
USE OF ANYONE ELSE.
LICENSE:
iii
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
iv
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Table of Contents
FEATURES AT A GLANCE .............................................................................................................................................11
OVERVIEW ........................................................................................................................................................................13
EASE OF USE ......................................................................................................................................................................16
COMPONENT ARCHITECTURE .............................................................................................................................................17
INSTALLATION ................................................................................................................................................................19
OVERVIEW .........................................................................................................................................................................19
PROCEDURE........................................................................................................................................................................20
REGISTRATION ................................................................................................................................................................24
REGISTRATION VIA SOFTWARE SERIAL NUMBER ...............................................................................................................24
How to Register the Software ........................................................................................................................................24
FLOATING LICENSE – OVERVIEW .......................................................................................................................................29
Floating License – Hardware Key Installation Instructions .........................................................................................31
Uninstall Floating License – (Hardware Key) ..............................................................................................................34
GSW SSH SERVER ............................................................................................................................................................35
v
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
vi
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
vii
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
TABLE OF FIGURES
viii
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Table of Tables
Table 1: GSW Software versions required for FIPS 140-2 .........................................................................................................................................37
Table 2: Device Operating System Versions Required for FIPS 140-2.....................................................................................................................37
Table 3: GSW Desktop Host Key Algorithms .............................................................................................................................................................60
Table 4: GSW Desktop Key Exchange Algorithms ....................................................................................................................................................61
Table 5: GSW Desktop Ciphers - SSH and with FIPS 140-2.....................................................................................................................................62
Table 6: GSW Desktop MACs both SSH and FIPS 140-2.........................................................................................................................................63
Table 7: GSW SSH Client Platforms ..........................................................................................................................................................................93
Table 8: SSH Host Key and Key Exchange Algorithms .......................................................................................................................................... 106
Table 9: SSH Ciphers ................................................................................................................................................................................................... 107
Table 10: SSH HMACs ................................................................................................................................................................................................ 108
Table 11: SSH Public Key Algorithms ....................................................................................................................................................................... 108
Table 12: SSH Compression........................................................................................................................................................................................ 109
Table 13: FIPS 140-2 certificate links ......................................................................................................................................................................... 110
Table 14: Version Upgrade Pricing with GSW Subscription Plan ......................................................................................................................... 111
Table 15: Version Upgrade Pricing Without Subscription Plan ............................................................................................................................. 111
Table 16: Steps to Renew the GSW Subscription Plan......................................................................................................................................... 112
ix
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Typographic Conventions
Italics: are used to emphasize certain words, especially new terms or phrases when
they are introduced.
Initial Caps Bold: Words that appear in initial caps boldface represent menu options, buttons,
icons or any object that you may click.
Terms/Abbreviations
SSH SHIELD This is the application and interface installer for the GSW SSHv2 Interface
Telnet Server Unless noted otherwise this refers to the GSW UTS with the default Telnet
Protocol
10
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Features at a Glance
Offering Secure Remote Logon, Secure Data Exchange, Secure Network Services and Secure Access to your Application
on an Insecure Network.
11
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
• Public Key Authentication with Microsoft IIS like certificate to user account mapping
• ‘One-to-one’ and ‘Many-to-one’ mapping methods that also support supports certificate trust lists
(CTL).
• Certificate mapping tool also supports public key to user account mapping
• Single Sign On through NTLM and Keberos over GSSAPI (‘gssapi-with-mic’)
• Certificate based authentication through:
• ‘x509v3-sign-rsa’ and ‘x509-sign-dss’ public key authentication standards
• Integrated with the Microsoft Certificate Stores
12
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Overview
The GSW Secure Shell (SSH) Server provides Secure Remote Access to your Windows Host including
Secure Remote Logon, Data Exchange, and Access to your Application on an Insecure Network
Thank you for purchasing the Georgia SoftWorks (GSW) SSH Server for Windows Server
2019/2016/2012/R2/2008/R2 and Windows 10/8/7. The GSW SSH Server provides unparalleled
performance and includes the powerful features needed to achieve operational objectives in demanding
commercial and industrial environments. The growing concern that sensitive data must not be available to
unauthorized third parties demands that a client can securely access the remote server. This is especially
important for RF access to a server.
Strong “End-to-End” encryption is employed with the GSW SSH Server. No clear text username and
passwords are transmitted across the network. No clear text application data is transmitted across the
network. All the data is encrypted using the strongest encryption available to provide complete
confidentiality.
A Federal Information Processing Standards Publication (FIPS) 140-2 compliant option is available and
may be purchased for the GSW SSH Server. This standard specifies the security requirements that will be
satisfied by a cryptographic module utilized within a security system protecting sensitive or valuable data.
This option is available to Federal agencies, including the US Military. The option is also available for
purchase by other organizations such as state governments, educational and research institutions,
commercial businesses and other entities with the need or desire to comply with this security requirement
for cryptographic modules standard.
The GSW SSH Server is useful in a wide variety of environments that require Secure Remote Access and
Strong Encryption that include:
• The GSW Business Tunnel is an excellent client application for the GSW SSH Server providing secure
web browsing, email access, RDP and much more.
The GSW SSH provides SSH (SSH version 2) operation rather than the older iteration SSH1 (SSH
version 1) operation. In addition to being faster, smaller and more flexible, SSH provides significant
security improvements. Even though SSH1 implementations exist, they are becoming fewer and are
13
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
usually not recommended. GSW has chosen to provide the strongest, fastest and version of SSH –
SSHv2.
An extremely important aspect of the GSW SSH Server is the ease of installation. Complex and
lengthy security configuration has been either eliminated or reduced to a minimum in order to get your
application up and running fast without forsaking performance or compromising desired security. You
do not have the administrative complexity of public/private keys and certificates when using the GSW
SSH Server default settings.
Secure Remote Login, Secure Access to the Application and ensuring Data Integrity are the primary
areas for concern when securing an application and the GSW SSH Server is optimized to address
these needs.
Strong Authentication
The GSW SSH Server offers the Strongest Authentication features available for Windows.
In addition to User Name/Password Authentication, the GSW SSH Server for Windows offers Public Key
Authentication with a GUI Internet Information Server (IIS) like certificate to user account mapping. This
includes ‘One-to-one’ and ‘Many-to-one’ mapping methods and also supports certificate trusts lists (CTL).
This mapping works with all user accounts including accounts defined in the Active Directory.
Additionally, the GSW GUI mapping tool allows public key to user account mapping.
To learn more about GSW Digital Certificate Based Authentication, please visit the GSW website:
https://www.georgiasoftworks.com/feature/ssh-server-windows/server-certificate-based-authentication-x509v3
The GSW SSH Server only allows connections from SSH clients. This ensures that all user data is
encrypted prior to leaving the local client device. The data is decrypted at the remote GSW SSH Server.
This includes authentication data such as the username and password that is required to login to the remote
server. The encryption is transparent, and thus the user will not perceive much, if any, variance between
operation of a telnet and SSH client.
The SSH connection ensures that the Login and Authentication data is encrypted so that a malicious party
cannot intercept the sensitive information.
14
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Since the connection between the SSH client and the GSW SSH Server is encrypted, the data transmitted is
not readable by unauthorized parties. When the User is authenticated, a shell is started (cmd.exe), where the
user can perform remote command execution or start applications. All data transmitted between the client
and the server is encrypted. No one can “snoop” the connection and intercept clear text data because none
exists!
Data Integrity
Data Integrity is essential for secure data exchange. The data received must be exactly the same as the data
sent; otherwise an unauthorized party may have modified the data during the transmission. The SSH
Transport layer ensures that the data received has not been modified from the data sent. This is
accomplished by including a message authentication code (MAC) with each packet transmitted. The MAC
is determined prior to encryption using the contents of the packet, a “Shared Secret” between the SSH client
and SSH server and a packet sequence number.
15
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Ease of Use
Many of the complex and lengthy configurations issues are automatically defined by the GSW SSH
Server. It has been observed that an overwhelming majority of customers do not need nor desire to set
every possible option available for SSH Security.
Most customers want the strongest security that is practical to implement. Through much dialog with
our resellers and customers who use RF environments a main theme emerged. The requirement to
“Keep it secure – simply” was paramount.
The installation of the GSW SSH Server is very quick. You will have users connecting with the
security of powerful SSH encryption much sooner than expected.
Ciphers: [email protected],[email protected],aes256-
ctr,aes192-ctr,3des-cbc,aes128-ctr,[email protected],aes256-
cbc,rijndael256-cbc,[email protected],aes192-cbc,rijndael192-
cbc,aes128-cbc,rijndael128-cbc,cast128-cbc,blowfish-cbc
MACs: [email protected],[email protected],hmac-sha2-
512,hmac-sha2-256,[email protected],hmac-sha1,hmac-sha1-96,hmac-
md5,none
AES-256 is the generally accepted strongest encryption standard offered by SSH – it is the
Advanced Encryption Standard using a 256 bits cryptographic key. This is also known as the
Rijndael algorithm which is a symmetric block cipher capable of using cipher keys that have
128, 192 and 256 bit lengths to process data blocks of 128 bits.
16
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The GSW SSH server can be configured to refuse a connection if the SSH client can not
operate with AES-256. Weaker encryptions only compromise the security of the connection so
only the strongest encryption can be configured to ensure the strongest protection - while
maintaining exceptional performance. AES-256 encryption is available on almost all SSH
clients. Of course other encryptions are supported such as 3DES. The GSW SSH Server will
negotiate with the client to agree on the algorithm unless configured otherwise.
However, those with the requirements can take full advantage of the security offered by Digital
Certificates and Public Keys using the innovative and easy to use SSH Shield Certificate
Mapping Tool.
Component Architecture
The GSW SSH is composed of:
The GSW UTS is the software module that contains the core software for the GSW Server products, and
the majority of the Advanced Features for the GSW Server Products
17
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The GSW UTS standard option for the Protocol and Interface is the Telnet Interface. This configuration is
marketed and sold as the GSW Telnet Server.
The GSW UTS SSH interface is installed by applying the GSW SSH Shield to the GSW UTS. The
GSW SSH Shield disconnects the Telnet Protocol Interface and installs the SSH Interface.
This configuration is marketed and sold as the GSW SSH Server
18
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Installation
Overview
When you purchased the GSW SSH Server you either:
a. Own a GSW Telnet Server (UTS) and are upgrading to the SSH Server
OR
b. A new customer purchasing the GSW SSH Server4.
If you own a GSW Telnet Server and are upgrading to the SSH Server then:
a. You must have GSW Telnet Server Version 6.50 or higher to install the SSH Shield. The
Telnet Interface becomes disabled when the SSH Shield is installed. If you have an older
version then you will need to upgrade to the Version 6.50 or higher before you can apply the
SSH Shield.
b. Next install the GSW SSH Shield
c. Register the GSW SSH Server.
NOTE: The GSW SSH Server requires registration. The registration for the GSW UTS is not
sufficient for the GSW SSH Server.
19
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Procedure
Installation of the GSW SSH Server software is simple and quick. From Windows
7/8/2008/R2/2012/R2/2016/2019, NT/XP/VISTA/2000/2003, perform the following:
1. Run the setup program (sshshld.exe). The Welcome screen of the setup program is displayed and
you are reminded and urged to exit all windows programs before continuing. You are also
reminded that you must have administrative privileges to install this program. Click Next.
20
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
1. A screen is displayed indicating the folder where the GSW SSH Shield will be installed. The
default is:
C:\Program Files\Georgia SoftWorks\Georgia SoftWorks SSH SHIELD.
You may change the installation directory at this time. Note: Make sure that the users of the SSH
Server have full access to the installation directory.
Select the Program Folder for the SSH Server. Click Next.
21
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
2. A shell opens a window with installation status lines similar to the figure below.
3. Now the Setup is complete! Click Finish and Now it’s time to register the SSH Server!
22
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Please view the readme.txt file as it may contain late breaking information about the SSH Server that
has not yet made it into the User Manual. Release notes are also contained in the readme.txt file.
Installation will result in the Georgia SoftWorks program group item “Installation Status” showing GSW
SSH as installed. Additionally, the version of the GSW SSH Shield is displayed along with the status of the
server and other Georgia SoftWorks software that may be installed.
Figure 9: SSH Installation Status (Your version will be shown in the fields above)
23
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Registration
The GSW SSH Server is licensed for a single server. The license must be activated for the software to
operate. To activate the license a valid Serial Number is required and is examined periodically by the
SSH Server software. The Serial Number also allows new versions to be downloaded and installed for
the duration of your subscription plan.
NOTE: Read System Signature chapter at the end of manual (page 115).
• Select the Start button on the task bar; select Programs, then Georgia SoftWorks UTS Server and
right click on Registration and Run as Administrator.
Prior to registering the SSH Server, a reminder dialog is presented indicating that the SSH Shield is not
registered.
24
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The GSW SSH Server will be fully functional for a Trial Period of 30 days without requiring registering
when installed for the first time on a system. Click OK
IMPORTANT NOTE: If you already own a GSW Telnet Server and you want to run a 30 day trial of the
GSW SSH Server then you will need to request a 30 day trial serial number from Georgia SoftWorks.
Please save a copy of the current SERIAL NUMBER for your telnet server prior to installing a 30 day trial
GSW SSH Server. In the event that you do not purchase the GSW SSH Server prior to the expiration of the
trial, you will need to apply your original serial number to re-activate the original GSW Telnet Server.
25
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Next, the registration screen is displayed. The Registration program automatically fills in the Product
Information fields as shown in the figure below. Complete the Customer Information fields as shown in the
figure below.
Note: The Product Information Name and Version must contain valid data or it will not generate a correct
Product ID.
Note that the Customer Information and Serial Number in the Registration Information may be already
filled. This will be the case if the GSW UTS has previously been registered and operating as the GSW
Telnet Server.
The registration information must be provided to Georgia SoftWorks to obtain the Serial Number. Several
methods are available for your convenience.
1. Please complete the Customer Information, including the Purchased From and the Application
software fields in the Registration Screen.
The registration information must be provided to Georgia SoftWorks to obtain the Serial Number. Several
methods are available for your convenience.
26
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
OR
Once Georgia SoftWorks receives the information, we can generate a Serial Number on demand and will
send it to you. You may close the registration program at this time.
3. When the Serial Number is provided run the Registration Program (see page 24) again and enter the
Serial Number. The easiest method to get the serial number is to highlight the returned Serial
Number and copy (ctrl-c). Then position the mouse in the Serial Number field in the
Registration Information box and paste (ctrl-v).
27
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
4. Click Register.
5. Click OK.
You will notice that in this case the Parameter field in the registration form is set to 3000, SSH Shield. This
indicates that the SSH Server is installed and registered and is enabled for 3000 sessions.
28
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
If you have purchased the Federal Information Processing Standards Publications (FIPS 140-2) option, you
can verify that it is enabled by viewing the registration screen as shown below in Figure 15. Please note that
the GSW SSH Server must be installed for the FIPS option to be available. GSW True FIPS 140-2
compliant connections can be identified using the GSW Session Administrator in the GSW UTS Server.
Please see the GSW UTS Users Guide for further details.
You may now run the Georgia SoftWorks SSH Server. Note that you will be able to obtain Free Updates
until the date specified.
NOTE: When a SSH Server Pack is purchased (SSH Server and GSW Telnet Server), the same physical
Floating License will contain valid Serial Numbers for both products.
With the Floating License NO software registration is required for the SSH Server to operate.
29
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
• Laboratory usage in a development or test environment where the SSH Server is required for
short periods of time on any particular machine and then moved to a new machine.
• Backup Servers in a production environment. Typically multiple SSH Servers are purchased for
backup systems, however with a Floating License the Hardware Key can be quickly moved from
the primary machine to the backup without any other registration requirements.
• Environments where a failed server must be replaced or rebuilt and immediately restored to
operation with full SSH Server capability.
The Georgia SoftWorks Floating License is a hardware key that connects to a female parallel port
connector or USB Port on the server. The parallel port Floating License does not impact functionality of the
port for other uses. The parallel hardware key acts as a pass-through allowing normal connections to the
other side of the key.
The Georgia SoftWorks Floating License is a hardware key that can be ordered for a Parallel or USB Port.
Figure 16: Floating License – Parallel Port Figure 17: Floating License - USB Port
The Parallel Port Floating License is a Pass Through allowing Not attached to a Server
normal function of the port.
The SSH Server will recognize the presence of the key and activate the software with the proper date for
which free version upgrades can be obtained. It does not matter which parallel or USB port on the server
the Hardware Key is installed, as all ports will be scanned for the installation of the key.
The Floating License currently is installed using the manufacturer SafeNet, previously Aladdin of the hardware
key setup program. It is described below. The name of the hardware key is HASP4 and you will see it displayed
in the setup screens. The best drivers for the HASP4 are the HASP HL drivers.
30
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Note: If you are using a USB Floating License on a Windows NT system - run the file aksnt4usb.exe prior to
the following steps.
1. Copy the files from the Floating License folder (hardkey) to the hard drive on your server.
2. Run the HASPUserSetup.exe program and follow the installation instructions. After installation of the
hardware key install the GSW SSH Server as described on page Error! Bookmark not defined. (if it is
not already installed). See the GSW SSH Server User’s Guide for installation instructions of the GSW
SSH Server.
3. If you have User Account Control enabled you may get a prompt that says “Do you want to allow the
following program to make changes to this computer?” Click Yes
31
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
4. You will first see the gemalto (formerly SafeNet) initial Welcome Screen.
Click Next
Read the license agreement and select “I accept the license agreement”
Click Next
32
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Click Next.
33
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Click Finish.
9. Plug the hardware key onto the parallel or USB port on the server.
NOTE: On some systems you may have to reboot the server after installation. If the Floating
License is not recognized (by the UTS) after installing the driver, please reboot the server.
NOTE: Removing or uninstalling the Floating License will disable the GSW UTS Server.
34
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
You can further configure the SSH Server to use more advanced features as needed. See page 42. Power
configuration options for the SSH Server are implemented as common Universal Terminal Server
configuration parameters. See User Manual for the GSW Universal Terminal Server for information on the
powerful features available to the GSW SSH Server.
Using the Installation Status Program Item within Georgia SoftWorks UTS program group, you can
view the Installation Status of the GSW UTS and SSH Server.
35
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The Windows Services Utility can be used to view and alter the status of the GSW SSH and the GSW
UTS services.
The Georgia SoftWorks GSW_SSHD service and the Georgia SoftWorks Universal Terminal Server
should both have a status of Started and a Startup Type of Automatic.
Using the Windows Services utility is the recommended method to start and stop the GSW services
when required.
36
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Georgia SoftWorks undertook a purposed and specific development effort in order to provide required
FIPS 140-2 compliant SSH server and client software to the United States Military. Having completed this
task, GSW is able to make this software available to other branches of the Federal government as well as
State governments and other institutions including research, educational and commercial.
Software Requirements
In addition to the development required for FIPS 140-2 compliance of the GSW server and client software,
the GSW mobile clients must run on an operating system that is FIPS 140-2 certified or provides a
cryptographic module that has been certified.
In order for your SSH connections to be FIPS 140-2 compliant you must ensure that you have the minimum
GSW software versions as well as the proper Windows Mobile/CE operating system version.
The significant aspect of the client device operating system is that the version of the cryptographic
module rsaenh.dll must be NIST (National Institute of Standards and Technology) certified, which
begins with build 14343.0.0. With Windows CE 5.0 extra attention should be taken to ensure the
version of rsaenh.dll. This may require contacting the device vendor to determine the correct version
number of that cryptographic module.
37
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Enable Option
FIPS 140-2 must be enabled on both the GSW SSH server and the GSW clients to complete a FIPS 140-2
compliant connection.
Figure 27: GSW True FIPS 140-2 Connection – Server and Client
In the Parameter field you will observe the number of concurrent sessions allowed followed by the text
“SSH Shield” indicating that the GSW SSH server is licensed and FIPS indicating that the FIPS 140-2
option is enabled.
38
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Use the “–i” command line parameter when launching on GSW Desktop clients to enable FIPS 140-2
option. Please see the UTS user’s guide for a description and examples of desktop client command line
options.
When FIPS 140-2 enabled GSW desktop clients are launched you will receive a banner indicating that the
“-i” command line parameter was issued by the client.
Please note that to have a both ends (client and server) FIPS 140-2 compliant, FIPS 140-2 must be enabled
on the GSW SSH Server too.
39
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Enable FIPS140-2 on GSW Mobile/CE clients via the Encryption list box. The Mobile/CE device
screen that you see will be similar to the ones below.
Please note that to have a both ends (client and server) FIPS 140-2 compliant, FIPS 140-2 must be enabled
on the GSW SSH Server too.
40
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Using the UTS Session Administrator you can verify True GSW FIPS 140-2 compliant connections. An
asterisk “*” will be prepended to the user name for connections that are FIPS 140-2 compliant for both the
client and the server.
The possibility exists that a third party client may be FIPS 140-2 compliant but it cannot be verified unless it is a
GSW client.
41
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Configuration
No configuration is required beyond installation in order for the GSW SSH Server to operate
providing secure logon, strong encryption and data integrity on an insecure network. Optional SSH
Configuration is provided to implement advanced features. The GSW SSH Server reads configuration
values each time the GSW_SSHD service is started.
Please consider the optional GSW UTS GUI Configuration tool for SSH provisioning or use the
methods described below.
Registry keys referenced in this User’s Guide are located here on 64 bit operating systems
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters
Registry keys referenced in this User’s Guide are located here on 32 bit operating systems
HKEY_LOCAL_MACHINE\SOFTWARE\Georgia SoftWorks\GSW_SSHD\Parameters
Allow/Disallow users using transfer files using the Secure Copy protocol. The use of the “scp
channel” is defined as defined in the SSH Connection Protocol.
You can Allow/Disallow this capability by modifying the following registry key.
This configuration is contained in the registry key bAllowServiceSCP. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GeorgiaSoftWorks\GSW_SSHD\Parameters\bAllowServiceSCP
The default value is 0x0 (Do not allow Secure Copy protocol). The value 1 allows the use of the Secure
Copy Protocol.
Note that szSFTPRoot (page 44) must be set for SCP to work.
The following is the procedure to change the registry key for allowing the use of the “scp channel.”
1. Click the Start button at the bottom left corner of your screen.
42
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GeorgiaSoftWorks\GSW_SSHD\Parameters\bAllowServiceSCP
Allow/Disallow users use of the ‘shell” channel as defined in the SSH Connection Protocol. This
functionality may be accessed using ssh client software.
You can Allow/Disallow this capability by modifying the following registry key.
This configuration is contained in the registry key bAllowServiceShell . The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bAllowServiceShell
The default value is 0x01. (Allow remote shell). The value 0x00 disallows the use of a remote shell.
The following is the procedure to change the registry key for allowing the use of a “shell.”
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GeorgiaSoftWorks\GSW_SSHD\Parameters\
bAllowServiceShell
43
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Allow/Disallow users use of the SFTP subsystem as defined in the SSH Connection Protocol. This
functionality may be accessed using sftp client software.
You can Allow/Disallow this capability by modifying the following registry key.
This configuration is contained in the registry key bAllowSFTP . The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bAllowSFTP
The default value is 0x00. (Disallow use of SFTP subsystem). The value 0x01 allows the use of a sftp
subsystem.
The following is the procedure to change the registry key for allowing the use of the sftp subsystem.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bAllowSFTP
44
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Specify the root folder for SFTP and SCP (page 42). This parameter must point to a valid local folder.
For example C:\sftproot.
The use’s sftp path is set to this value with the domain name and user name appended.
Domain: receiving
User name: bob
For example C:\sftproot\receiving\bob.
Note: The system administrator must ensure that receiving\bob has access to this folder
and its subfolders.
This configuration is contained in the registry key szSFTPRoot . The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szSFTPRoot
The following is the procedure to change the registry key for specifying the SFTP Root Folder..
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szSFTPRoot
45
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Specify Universal Naming Convention (UNC) destinations for SFTP and SCP (page 42). UNC paths
start with double slashes or backslashes and you can copy files with the security of SSH to network
shares.
There are three registry values that must be configured on the GSW SSH Server to use a UNC destination
for SFTP or SCP.
• bAllowServiceSCP
• bAllowServiceSFTP
• bRestrictedSFTP
• szSFTPRoot
The following procedure is used to change the registry keys for specifying a UNC destination.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szSFTPRoot
46
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bRestrictedSFTP
The new values will take effect when the GSW SSHD service is restarted
For example create a share \\backups\USA\Tampa with the name TAMPA and another share
\\backups\USA\Atlanta with the name Atlanta
47
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The default value is 0x01. (Allow Digital Certificate Logon). The value 0x00 disallows Digital Certificate
Logon.
The following is the procedure to change the registry key for enabling or disabling Digital Certificate
Logon.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableLogonCertificate
48
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The default value is 0x01. (Allow public key logon). The value 0x00 disallows public key Logon.
The following is the procedure to change the registry key for enabling or disabling public key Logon.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableLogonPublicKey
This can be controlled by the registry key bEnableLogonPassword . The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableLogonPassword
The default value is 0x01. (Allow user name/password logon). The value 0x00 disallows user
name/password logon.
49
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The following is the procedure to change the registry key for enabling or disabling user name/password
logon.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableLogonPassword
This can be controlled by the registry key bEnableLogonGSSAPI. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableLogonGSSAPI
The default value is 0x01. (Allow GSSAPI logon). The value 0x00 disallows GSSAPI logon.
The following is the procedure to change the registry key for enabling or disabling user name/password
logon.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableLogonGSSAPI
50
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
This can be controlled by the registry key szBindIPv4Address. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia
SoftWorks\GSW_SSHD\Parameters\szBindIPv4Address
The default value is the empty string. (Listen on all IPv4 interfaces).
The following is the procedure to change the registry key to specify the address to listen for IPv4
connections.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szBindIPv4Address
This can be controlled by the registry key szBindIPv6Address. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia
SoftWorks\GSW_SSHD\Parameters\szBindIPv6Address
51
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The default value is the empty string. (Listen on all IPv6 interfaces).
The following is the procedure to change the registry key to specify the address to listen for IPv6
connections.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szBindIPv6Address
Allow/Disallow users using the “exec” channel as defined in the SSH Connection Protocol. The ‘Exec
channel’ allows to use ssh ‘exec’ capable clients in scripts.
This functionality may be accessed as shown in this example
You can Allow/Disallow this capability by modifying the following registry key.
This configuration is contained in the registry key bAllowServiceExecute . The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia
SoftWorks\GSW_SSHD\Parameters\bAllowServiceExecute
The default value is 0x0 (Do not allow access to the “exec” channel). The value 1 enables the use of the
“exec” channel.
The following is the procedure to change the registry key for allowing the use of the “exec” channel.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
52
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bAllowServiceExecute
Enable or disable the use of the RSA host key for server-client-authentication.
This can be controlled by the registry key bAllowRSAHostKey. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia
SoftWorks\GSW_SSHD\Parameters\bAllowRSAHostKey
The default value is the 0x01 . (RSA Host Key is enabled to be used for server-to-client authentication).
0x00 will disable its use for server-to-client authentication.
The following is the procedure to change the registry key to enable or disable the use of the RSA Host Key.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bAllowRSAHostKey
53
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Enable or disable the use of the DSA host key for server-client-authentication.
This can be controlled by the registry key bAllowDSAHostKey. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia
SoftWorks\GSW_SSHD\Parameters\bAllowDSAHostKey
The default value is the 0x01. (DSA Host Key is enabled to be used for server-to-client authentication).
0x00 will disable its use for server-to-client authentication.
The following is the procedure to change the registry key to enable or disable the use of the DSA Host Key.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bAllowDSAHostKey
Enable or disable the use of the ECDSA host key for server-client-authentication.
This can be controlled by the registry key bAllowECDSAHostKey. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia
SoftWorks\GSW_SSHD\Parameters\bAllowECDSAHostKey
The default value is the 0x01. (ECDSA Host Key is enabled to be used for server-to-client authentication).
0x00 will disable its use for server-to-client authentication.
The following is the procedure to change the registry key to enable or disable the use of the ECDSA Host
Key.
54
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bAllowECDSAHostKey
55
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
For each category there may be up to four algorithm lists that are preconfigured and ready to use.
• GSW Default
You may also create your own custom list of algorithms from the available algorithms. This gives you the
flexibility to restrict connections to only certain strength algorithms or to allow only specific legacy
algorithms or any combination thereof.
GSW determines the best available algorithms for each category at each release. The list of algorithms
setup at installation for each category is called the “GSW Default Algorithms list”. No configuration is
required to use the GSW Default Algorithms.
The FIPS 140-2 Enabled list is a list of algorithms that does not include any algorithms that are not
supported by FIPS 140-2. When you Enable FIPS 140-2 and restart the SSH service, the FIPS 140-2
Enabled list is activated.
In some cases there is no difference in the algorithms available for FIPS 140-2 Enabled and Disabled. We
call this list “All Available Algorithms”. Not surprisingly, it is also used to refer to all the available
algorithms.
If the empty string is configured for the value, then you get the complete list of algorithms available based
on the FIPS 140-2 setting.
56
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Specify the ciphers that the server can offer to the client by modifying the registry key
szKexAlgoritms. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szKexAlgorithms
The following is the list and order of all Key Exchange Algorithms available.
ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,curve25519-
sha256,[email protected],diffie-hellman-group-exchange-
sha256,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,diffie-
hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-
group1-sha1,diffie-hellman-group14-sha1Page
The list of Key Exchange Algorithms does not vary based the Enable/Disable value for FIPS 140-2 option.
The following is the procedure to change the registry key to specify the Key Exchange Algorithms
available to the client.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szKexAlgorithms
57
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Specify Ciphers
Specify the ciphers available to the server that are offered to the client. The ciphers are available to
the client in the server’s default order unless specified. The default order will vary from release to
release to deliver the best blend of security and performance.
Specify the ciphers that the server can offer to the client by modifying the registry key szCiphers. The
key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szCiphers
The following is the list and order of all ciphers available with FIPs 140-2 disabled
aes128-cbc,[email protected],aes128-ctr,aes128-
[email protected],[email protected],3des-cbc,blowfish-cbc,aes192-
cbc,aes192-ctr,aes256-cbc,aes256-ctr,rijndael128-cbc,rijndael192-
cbc,rijndael256-cbc,[email protected],cast128-cbc
The following is the list and order of ciphers available with the FIPS 140-2 option enabled.
aes128-cbc,aes128-ctr,3des-cbc,aes192-cbc,aes192-ctr,aes256-cbc,aes256-
ctr,[email protected],[email protected],rijndael128-
cbc,rijndael192-cbc,rijndael256-cbc,[email protected]
The registry parameter bDisableFIPS must be set to 1 to use algorithms which are not on the FIPS list. The
default value of this parameter is 0.
The following is the procedure to change the registry key to specify the Ciphers available to the client.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szCiphers
58
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Specify the Message Authentication Algorithms that the server can offer to the client by modifying the
registry key szMACs. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szMACs
The following is the default value for Message Authentication Code algorithms.
[email protected],[email protected],hmac-sha2-
512,hmac-sha2-256,[email protected],hmac-sha1,hmac-sha1-96,hmac-
md5,none
The following is the list and order of all algorithms available with the FIPS 140-2 option disabled.
[email protected],[email protected],hmac-sha1-
[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96,hmac-
md5,none
The following is the list and order of algorithms available with the FIPS 140-2 option enabled.
[email protected],[email protected],hmac-sha1-
[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96
The registry parameter bDisableFIPS must be set to 1 to use algorithms which are not on the FIPS list. The
default value of this parameter is 0.
The following is the procedure to change the registry key to specify the Message Authentication Code
algorithms available to the client.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szMACs
59
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
GSW Desktop SSH client provides command line arguments to specify the algorithms and order that are
presented to the SSH Server. Customers concerned about achieving high level of security should use the
command line arguments to specify safe algorithms as noted in different algorithm tables starting on page
106. It is recommended to only use the safe algorithms, and not offer unsafe algorithms.
If you do not specify command lines arguments for the Desktop client, then defaults are used and noted in
each section. The defaults are the strongest possible algorithms regardless of FIPs setting
For more detail on Command Line Options for the SSH Clients please see the section Georgia SoftWorks
Desktop Client Command line options – Description in the GSW UTS Manual.
If you do not specify the Host Key Algorithms then the default is:
• rsa-sha2-512
See the master Host Key Algorithm list for all GSW SSH products on page 106. Safe algorithms are in
green and unSafe are in red.
60
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
If you do not specify the Key Exchange Algorithms then the defaults are listed below:
• diffie-hellman-group18-sha512
• curve25519-sha256
See the Master Key Exchange algorithm list for all GSW SSH products on page 106. Safe algorithms are in
green and unSafe are in red.
61
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Ciphers List
Note: There are different lists for Ciphers depending if you have FIPs 140-2 enabled.
GSW Desktop SSH Client Ciphers
SSH with FIPS 140-2 Disabled with FIPS 140-2 Enabled
• aes128-ctr5 • aes128-ctr5
• [email protected] • [email protected]
• aes128-cbc
• aes128-cbc
• 3des-cbc
• [email protected] • aes192-ctr6
• 3des-cbc • aes192-cbc
• blowfish-cbc • aes256-ctr7
• aes192-ctr6 • [email protected]
• aes192-cbc • aes256-cbc
• rijndael128-cbc
• [email protected]
• rijndael192-cbc
• aes256-ctr7
• rijndael256-cbc
• aes256-cbc • [email protected]
• rijndael128-cbc
• rijndael192-cbc
• rijndael256-cbc
• [email protected]
• cast128-cbc
Table 5: GSW Desktop Ciphers - SSH and with FIPS 140-2
• [email protected]
• [email protected]
• aes256-ctr
See the master Cipher list for all GSW SSH products on page 107. Safe algorithms are in green and unSafe
are in red.
62
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Default MACs:
See the master Message Authentication Code (MACs) list for all GSW SSH products on page 108. Safe
algorithms are in green and unSafe are in red.
63
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Note: Long style arguments have the syntax using the plus “+” sign followed by the argument name, then
an equals sign “+” and then the list of algorithms comma separated. These are the algorithms that can be
configured on the SSH command line.
+HostKeyAlgorithms=<list_of_host_key_algorithms>
+KexAlgorithms=<list_of_kex_algorithms>
+Ciphers=<list_of_ciphers>
+Macs=<list_of_macs>
When I connect to the SSH Server I want the high security and want to use the
following algorithms.
Please note the above command is one a single line, so don’t be confused by the
line wraps.
Please note that the other command line parameters in this example, –ujohndoe –d. –pmostsecure and
-hsoloman are just examples for a particular system. The emphasis of this example is to show the algorithms
selected.
64
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The default port number is port 22. You can change the port number to the port of your choice.
Important: Be sure that you also change the port number on the SSH clients to the same port number
configured on the SSH Server.
In the event you want to change the SSH port on the server you can do so by changing the following
registry key.
This configuration is contained in the registry key usGSWSSHDPort which is a number. The key is:
For 64-bit
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\GeorgiaSoftWorks\GSW_SSHD\Parameters\usGSWSSHDPort
For 32-bit
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters \usGSWSSHDPort
This following is a procedure to change the registry key for the SSH port number.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
5. Select Registry Key:
For 64-bit HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters
For 32-bit HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters
65
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The SSH Server RSA Private Key is in an encrypted file and is in the PEM format.
This configuration is contained in the registry key szServerRSAKeyFile which is a text string.
You can change the location by modifying the registry key.
The default value is the installation folder for the GSW SSH Shield.
C:\Program Files\Georgia SoftWorks\Georgia SoftWorks SSH Shield\sshd_rsa.key
The following is a procedure to change the Location of SSH Server RSA Private Key.
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
The new value will take effect when the GSW SSHD service is restarted.
66
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The SSH Server DSA Private Key is in an encrypted file and is in the PEM format.
This configuration is contained in the registry key szServerDSAKeyFile which is a text string.
You can change the location by modifying the registry key.
The default value is the installation folder for the GSW SSH Shield.
C:\Program Files\Georgia SoftWorks\Georgia SoftWorks SSH Shield\sshd_dsa.key
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
7. Enter the new value for the Server DSA Key Location and click OK
The new value will take effect when the GSW SSHD service is restarted.
67
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The SSH Server Elliptic Curve Cryptography DSA Private Key is in an encrypted file and is in the
PEM format.
The default value is the installation folder for the GSW SSH Shield.
C:\Program Files\Georgia SoftWorks\Georgia SoftWorks SSH Shield\sshd_ecdsa.key
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
7. Enter the new value for the Server DSA Key Location and click OK
The new value will take effect when the GSW SSHD service is restarted.
68
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The file HostFingerPrints.txt in the Georgia SoftWorks SSH Shield installation folder8 contains key fingerprints
for all host keys offered for server-to-client authentication. These key fingerprints may be entered for host
fingerprint configuration of the Georgia SoftWorks Business Tunnel.
In the event that GSW Technical Support requires additional information, you may need to turn on
SSH internal activity logging.
You can activate the internal SSH activity logging by modifying the following registry key.
This configuration is contained in the registry key bEnableWODLog which is a flag. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableWODLog
69
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\bEnableWODLog
7. Enter the new value for the Enable Activity Logging and click OK
The new value will take effect when the GSW SSHD service is restarted.
70
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
In the event that GSW Technical Support requires additional information, you may need change the
SSH internal activity log file location.
You can modify the internal SSH activity log file name and location by modifying the following
registry key.
This configuration is contained in the registry key szWODLogFile which is a text string. The key is:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szWODLogFile
The default value is the log folder in the GSW UTS Installation directory. Usually this is:
C:\GS_UTS\log
Note: (you must be on the Windows NT/XP/VISTA/2000+ system that the Georgia SoftWorks SSH Server
is installed. However, you may connect to the SSH Registry from a remote location).
1. Click the Start button at the bottom left corner of your screen.
2. Click RUN
3. Type REGEDIT
4. Click OK
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters\szWODLogFile
7. Enter the new value for the Enable Log File Name and Location and click OK
The new value will take effect when the GSW SSHD service is restarted.
71
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The entire configuration is done through a GUI with wizard style dialogs reminiscent of IIS certificate-to-
user account mapping. The solution preserves all of the cryptographic strength of the public key solution,
adds convenient, well scaling, certificate-to-user account mapping options.
The overall solution allows authenticating SSH users who log on with a client certificate by mapping the
certificates to Windows user accounts. The client certificates are analyzed and used to either deny or grant
host access to a connecting session.
9 A Digital Certificate binds a name (or identity) to a public key value and is used in verifying the identity of the certificates owner.
72
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
'One-to-one' mapping maps a individual client certificate to a individual Windows user account. The SSH-
2 server compares certificates from a pre-configured list with the client certificate that is sent by the SSH-2
client. An identical match must occur for the mapping to proceed.
'Many-to-one' mapping maps multiple certificates to an individual Windows user account. It uses wildcard
matching rules to define the certificate criteria for mapping. This type of mapping does not compare the
actual client certificate. Instead, it accepts all client certificates that meet specific criteria. If a certificate
matches the rules, it is mapped to the indicated user account. Typically one would also select a Certificate
Trust List (CTL) to assure the client certificates are truly trustworthy. CTLs make it possible to limit the
number of acceptable root CAs which are able to issue certificates to users.
73
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Public Key '1-to-1' mapping provides a very nice method to allow public key to user account mapping.
74
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
You can also configure Certificate Trust List (CTL) with the GSW Mapping Tool.
75
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Public key authentication is far more secure than passwords and provides exceptional usability benefits.
The cryptographic strength of the recommended and trustworthy algorithms are superior to even the
longest passwords. The user does not have to remember a password and Public Key Authentication
provides automatic logon capabilities. The benefits are substantial.
When using this type of authentication, the entity (SSH client software) being authenticated has a public
key and a private key. The private key is kept on the client, while the public key is stored on the server.
In this example we will generate a Public/Private key pair, install the private key on the client and the
public key on the server. We also map the public key to a Windows user account, which provides
automatic logon on.
76
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
There are a multitude of tools available to generate a Public/Private key pair, many at no cost. In this
example we will use PuTTYgen to create a public and private key.
1. Download PuTTYgen. Click on the PuTTYgen executable.
2. Select the SSH-2 RSA radio button, near the bottom of the window.
3. Create a key set by clicking on the “Generate” button.
4. Randomly move the mouse pointer in the open area under the progress bar, until the
progress bar completes.
77
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Figure 38: Puttygen Tool Uses Mouse-Movement to Create Randomness for Key Creation
78
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
6. Click Save public key and give it a descriptive file name and location to be stored.
7. Click Save private key and give it a descriptive file name and location to be stored. You
may now close the PuTTYgen tool.
You have now create the public/private key pair. The next step is to install the public key on the
server and the private key on the client.
10 The optional Passphrase is used when the key is installed on the client (see page 76 )
79
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Install Public Key on the Server and Map to Windows User Account
1. Open the Public key you created with notepad or a simple text editor.
2. Copy the highlighted area as shown below to your clip board. Do not include the leading
and trailing description tags.
4. Expand Public Key Mapping, and select 1-to-1. Next click Add.
80
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
5. Click Enable this mapping and paste the clip board data into the Public key area. Fill out
the rest of the fields below.
6. Click OK, and click Apply. You should now see the mapping you created.
81
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
7. The changes will not take effect until the Georgia SoftWorks SSH
Shield service is restarted. Click yes to restart SSH or No if you intend
to restart later.
82
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Now we will install and configure the Private Key on the GSW client. This will allow the device to
connect securely using an SSH encrypted session.
1. Copy the private key generated previously onto the mobile device using Mobile Device
Center. You can download it here.
2. Open the GSW client on the device you wish to connect to the GSW server.
Figure 44: Opening the Client on a Device to Set-up Public Key Log-on
83
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
3. Select the Session Configuration File you wish to modify. In this case we are selecting
default.gswtc
84
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
4. Enter the host information and port, 22 is the default. Select “Options…”
Figure 46: Selecting Options on GSW SSH2 Client to Configure Public Key Log-on
85
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
86
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
7. This will enable the “Configure” button. Click the “Configure” button.
87
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
88
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
9. Navigate to the location where you saved the Private Key (*.ppk) on the device, and select.
89
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
10. Enter the passphrase (if created, see page 79), and press the “OK” button at the bottom of
the screen. You should see a confirmation that the key was imported successfully. Click “OK”
to close the dialog box.
90
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
91
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
12. You should see the GSW client connect and begin a session.
92
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
SSH Clients
In addition to the GSW SSH clients, the Georgia SoftWorks SSH Server is compatible with all SSH
compliant third party clients.
Please see the Georgia SoftWorks UTS User Guide for detailed description of client features and options.
93
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
In general, the GSW client installation procedures and features described in the GSW UTS User Manual
are applicable to the GSW SSH Clients.
To invoke the GSW SSH Client, use the GS SSH Client shortcut in the GSW UTS program group. When
connecting with the GSW SSH desktop client, you will get a logon banner similar to the one displayed
below. The Host, Username, Password, and domain prompts are presented.
94
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
GSW provides SSH clients for Pocket PC/Windows Mobile class devices. Installation is as described in the
GSW UTS User Manual. Items specific to the GSW SSH Pocket PC clients are noted below.
Windows Mobile
Upon installation of the GSW Windows Mobile client, you have the connection configuration similar as
pictured below. The main item of interest is the Port selected to use for the SSH connection. The normal
port used for SSH connections is port 22. Please configure as identified.
Port 22 is used
for SSH
connections
Options Button
95
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
After clicking on the Options Button the following screen is displayed. The encryption combo box
allows the options No encryption, 40-bit, 128-bit, SSH and FIPS SSH. Options selected that do not fit
into the context of the GSW Server will result in a failed connection. For example, selecting FIPS
SSH encryption when the GSW SSH server does not have FIPS enabled.
This is a screen
shot of a
PPC2003
connection to
SAP via
SAPConsole.
Note: The Yellow
SSH symbol
confirms that the
SSH protocol is in
use.
96
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Georgia SoftWorks provides a Windows CE .NET 4.2+ SSH client. Below are some screen images of the
GSW SSH Client in action on a Psion-Teklogix device.
Upon launching from the shortcut on the device desktop the initial screen (Figure 58) is displayed. From the
Initial Screen you have the menu options File, View, Session and Help.
The Session menu (Figure 59) item provides the mechanism to Connect, Disconnect and to configure your
session configuration settings.
Figure 58: Psion-Teklogix Initial Screen Figure 59: Psion-Teklogix – Session Menu Items
97
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
By selecting the Session -> Settings the screen below (Figure 60) is presented allowing configuration of the
Host, Port, User, Password and Domain. Selecting the Options button provides similar options as presented
in the GSW Windows Mobile client (Figure 56).
Figure 60: Psion-Teklogix Connection Settings Figure 61: Psion-Teklogix – Save Settings
When the configuration is complete you can save the session configuration information by using the File
menu item (Figure 61). You may recall the configuration and minimize the amount of data typed to connect.
It also provides the flexibility to save several profiles if needed.
98
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Using the Menu item Session->Connect, the connection is established and Figure 62 is an example of a
connection to SAP via SAPConsole.
Figure 62: Psion-Teklogix running SAP via SAPConsole Figure 63: Psion-Teklogix Save Client Settings Menu
After the work is complete the session is disconnected by using the Menu item Session->Disconnect.
99
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The GSW SSH Server allows connections from 3rd Party SSH Clients.
Please see the User’s Manual of the 3rd party SSH client of interest for operations of that client. We have
included screen shots from three popular SSH clients operating with the GSW SSH Server.
Below is a screen shot of the SecureCRT SSH Client connected to the GSW SSH Server and running SAP
via SAPConsole.
100
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Below is a screen shot of the PuTTY SSH Client displaying some of the GSW International character
support.
101
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Below is a screen shot of the F-Secure SSH Client connected to the GSW SSH Server and running SAP via
SAPConsole.
102
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
A user account’s domain can be specified in the SSH client’s user name field. If a domain is not specified
then the GSW UTS will use the default domain configured in the UTS registry. If a UTS default domain is
not configured and a domain is not specified in the SSH client’s user name field then the system will
attempt to validate the user account logon using the local account database.
Use the following syntax to specify the domain in the SSH client’s user name field:
username@domainname
Where username is the name of the user and domainname is the name of the domain.
If a default domain is specified in the UTS registry then the domain entered above will take precedence.
Please see the GSW UTS User Manual for more information.
103
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Registry Variables
Many registry variables exist for provisioning the system. Registry variables are an excellent method to
configure software while utilizing skills already learned by the system administrator. There is no need to
learn yet another interface to provision the software. Here is a list of the registry variables and a brief
description of their use. Please see the appropriate section in this User Manual for complete descriptions.
All Registry values used by the Georgia SoftWorks SSH Server are stored in the following Registry path.
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Georgia SoftWorks\GSW_SSHD\Parameters
• bAllowServiceShell - Controls use of the “Shell” channel as defined. Default=1. (Page 43)
• bDisableFIPS - This parameter must be set to 1 to use algorithms which are not on
the FIPS list. The default value of this parameter is 0.
104
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
• szCiphers- Specify the list of Ciphers the server can offer the client.
Default= ” [email protected],[email protected],aes256-
ctr,aes192-ctr,3des-cbc,aes128-ctr,[email protected],aes256-
cbc,rijndael256-cbc,[email protected],aes192-cbc,rijndael192-
cbc,aes128-cbc,rijndael128-cbc,cast128-cbc,blowfish-cbc “ (Page 56)
• szKexAlgorithms - Specify the list of Key Exchange Algorithms the server can offer the client
Default= ” curve25519-sha256,[email protected],diffie-hellman-
group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-
sha256,diffie-hellman-group14-sha256,ecdh-sha2-nistp521,ecdh-sha2-
nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha1,diffie-
hellman-group14-sha1,diffie-hellman-group1-sha1” (Page 57)
Default= ” [email protected],[email protected],hmac-
sha2-512,hmac-sha2-256,[email protected],hmac-sha1,hmac-sha1-
96,hmac-md5,none” (Page 58)
• szServerDSAKeyFile - Location of SSH Servers DSA private key file in PEM format.
The file is encrypted. (Page 67)
• szServerECDSAKeyFile - Location of SSH Servers ECDSA private key file in PEM format.
The file is encrypted. (Page 68)
• szServerRSAKeyFile - Location of SSH Servers RSA private key file in PEM format.
The file is encrypted. (Page 66)
• szWODLogFile - Path and File Name of the SSH internal activity log file.
To enable the log bEnableWODLog must be set to 1. (Page 71)
usGSWSSHDPort - The port number clients will be connecting to. (Page 42)
Default = 22(decimal) is the standard port assigned to SSH.
105
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
106
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Ciphers
Ciphers are algorithms used for performing encryption or decryption.
107
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The public key / certificate formats supported by the GSW SSH Server are shown below.
GREEN – Strong Enough to be considered SAFE
Purple – Questioned by 3rd parties
GSW SSH GSW Clients
Black – not researched yet. Sever V8.10.0003
RED – Should not be used
8.10.0003 Desktop CE CE GSW
4.2 5.0+ ConnectBot
Public Key Algorithms FIPS FIPS FIPS FIPS V1.9.9
rsa-sha2-512 √ √ √ √ √ √ √
rsa-sha2-256 √ √ √ √ √ √ √
ssh-ed-25519 √
ssh-rsa √ √ √ √ √ √ √ √
ssh-dss √ √ √ √ √ √ √ √
Table 11: SSH Public Key Algorithms
108
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Compression
GREEN – Strong Enough to be considered SAFE
Purple – Questioned by 3rd parties
GSW SSH GSW Clients
Black – not researched yet. Sever V8.10.0003
RED – Should not be used
8.10.0003 Desktop CE CE GSW
4.2 5.0+ ConnectBot
Compression FIPS FIPS FIPS FIPS V1.9.9
None √ √ √ √ √
zlib √ √ √ √ √
Table 12: SSH Compression
109
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
http://csrc.nist.gov/publications/PubsFIPS.html
Certificate numbers
Certificate Descriptions
Numbers
Certificate #560
#560 Windows CE and Windows Mobile Enhanced Cryptographic Provider (RSAENH)
(Software Versions: 5.01.01603 [1], 5.00.911762 [1], 5.04.17228 [2] and 5.05.19202 [2])
http://csrc.nist.gov/publications/PubsFIPS.html
Certificate #825
#825 Windows CE and Windows Mobile Enhanced Cryptographic Provider (RSAENH)
(Software Version: 6.00.1937)
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140crt/140crt825.pdf
Certificate #918
#918 OpenSSL FIPS Object Module)
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140crt/140crt918.pdf
110
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The GSW Subscription plan provides access to the most current versions of the software as well as
priority support.
In general, Georgia SoftWorks releases a new version as soon as new features are ready rather than
waiting for quarterly or annual releases. Due to our development and release generation methods and
JIT User Manual production, we can release software on a much more frequent basis than other
organizations. As soon as features or defect resolutions are Alpha and Beta tested we generate a
release. This provides our customers with features much quicker than the “grouping” or “scheduling”
method used by other companies.
The GSW SSH Server (and Rocket Pack, RF DTIO) Subscription grants access to free version
upgrades for the duration of the subscription. The duration is either 1, 2 or 3 years. This is good as
you can obtain new versions of the software at your convenience, obtaining all new features and
defect resolutions.
NOTE: New versions can be downloaded from our web site at you convenience.
The GSW Subscription plan is an excellent value. Even if you upgrade the software once every few
years you will save with the subscription.
The pricing for version upgrades without the Subscription is based on the period of time since the date
of the original purchase or last version upgrade.
111
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
3. Run the Setup Program for the Update as done in the original installation.
Please use the following procedure when renewing the GSW SSH Server or Rocket Pack
Subscription.
112
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
o Clients: Contains all the GSW clients for the SSH Server and the Telnet Server.
These files are needed for automatic update of our client software.
• GSJC Contain the files for the GS Java Client and Applet
• Log Contains the GSW UTS Log files to provide to the GSW Technical Support
Group in the event of a problem. See page 116 for more information.
• Scripts This is where your logon scripts will reside. See GSW UTS User Manual.
113
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The installation folder layout of the GSW SSH Shield is as follows under the Windows\Program Files
(x86) folder.
The Georgia SoftWorks UTS logs folder contains the GSW SSH Server log files to provide to the GSW
Technical Support Group in the event of a technical problem.
114
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
The registration software obtains a system signature that is unique to your system. This signature is an
added security measure to inhibit unauthorized personnel to obtain working copies of the GSW SSH
Server.
The signature is comprised of hardware and software identifiers that exist on your system that make the
target system unique. These identifies are hashed into a Product ID and a Serial Number can be generated
from this Product id.
If major hardware components of your system are removed, replaced or modified your Serial Number
may discontinue to work and you may need a new Serial Number to obtain access to the SSH Server.
Please contact Georgia SoftWorks Technical Support if needed.
115
G S W S S H S E R V E R “ K E E P I T S E C U R E – S I M P L Y ” A U G U S T 1 3 , 2 0 2 0
Technical Support
In order to keep Technical Support Free please help keep our cost down.
• Write your question down. This not only helps us but also helps you in articulating the question.
To expedite support for suspected problems please perform the following test steps below to help us
diagnose the issue.
1. Disconnect all users. Make sure that no other user connects at the time of the test.
2. Wait 5 minutes
Delete all log files from the GSW UTS Server installation ‘Log’ subdirectory on the computer
running the GSW Universal Terminal Server. (Usually c:\GS_UTS\Log)
6. The log files are automatically re-created. Send us the files using the GSW Ticket System
b. The logon script associated with the user experiencing the problem. (That is the
c_start.bat or the k_start.bat file that resides in the scripts folder in the GSW
UTS directory
Again, send us the files using the GSW Ticket System. We try to respond within 24 hours.
Or Call 706.265.1018 EST, M-F 9:00 a.m. to 5:00 p.m. and have your Product ID ready
116