SecureShell/MFA

From UMIACS
Jump to navigation Jump to search

Overview

UMIACS has rolled out multi-factor authentication requirements when using SSH to connect to our publicly-routable hosts to provide better account and data security. Publicly-routable hosts in the context of UMIACS are hosts that have an IP address in one of the following subnets:

  • 128.8.118.0/23
  • 128.8.120.0/23
  • 128.8.122.0/24
  • 128.8.124.0/24
  • 128.8.141.0/24
  • 129.2.30.0/26

SSH has two different authentication methods that we currently support on all of our internal hosts: interactive password authentication and public key authentication. Multi-factor authentication-enabled SSH on our public-facing hosts only supports interactive password authentication, with the secondary factor coming from our Duo instance. We do not currently support public key based authentication and Duo multi-factor authentication on our public-facing hosts. Please note that unfortunately U2F hardware tokens registered with Duo are not supported for SSH login specifically. Other hardware tokens such as a YubiKey or Duo's own hardware token will still work.

Example

The initial command or session setup for connecting to a host with multi-factor authentication enabled over SSH is the same as one that does not have it enabled. Our example for connecting to a host over SSH can be found here. In the below example, we are also SSH-ing to a Nexus node e.g. ssh username@nexusgroup00.umiacs.umd.edu

Once you enter the command (if using a native terminal) or start the session (PuTTY or other terminal emulators), you will be presented with the following prompt:

Password:

Enter your UMIACS password here (the same as if you were using interactive password authentication to connect to an internal host). After correctly entering your password, you will be taken to the following prompt. Please note: The options shown here will vary depending on what/how many devices you have registered with our Duo instance. In this example, we have a mobile phone that has the Duo app installed, a tablet (iPad) that has the Duo app installed, a Duo hardware token, and a YubiKey all registered against our UMIACS Duo instance.

Password:
Duo two-factor login for username

Enter a passcode or select one of the following options:

 1. Duo Push to XXX-XXX-1234
 2. Duo Push to iPad (iOS)
 3. Phone call to XXX-XXX-1234
 4. SMS passcodes to XXX-XXX-1234

Passcode or option (1-4):

(if you have a registered phone, the last 4 digits shown will be replaced with the last 4 digits of the phone number you specifically have registered)

The numbered options here correspond to different methods that Duo can take to authenticate you, and are more or less identical to the options that would be presented to you via a GUI if you were attempting to sign into another of our multi-factor authentication secured services, such as our Directory application. You can also enter the passcode

Duo Push to ___

This will send a push notification to the Duo app on whichever device you chose for you to accept to proceed.

Passcode or option (1-4): 1

Pushed a login request to your device...

Phone call to XXX-XXX-XXXX

This will call your registered phone and ask you to press any key on your phone to proceed.

Passcode or option (1-4): 3

Calling your phone...
Dialing XXX-XXX-1234...

(After answering)

Answered. Press any key on your phone to log in.

SMS passcodes to XXX-XXX-XXXX

This will send a one time passcode to your registered phone via SMS and then redisplay the prompt. Type the passcode received at the new prompt (which will show the first number of the passcode sent as a hint) to proceed.

Passcode or option (1-4): 4

New SMS passcodes sent.

Duo two-factor login for username

Enter a passcode or select one of the following options:

 1. Duo Push to XXX-XXX-1234
 2. Duo Push to iPad (iOS)
 3. Phone call to XXX-XXX-1234
 4. SMS passcodes to XXX-XXX-1234 (next code starts with: 1)

Passcode or option (1-4): 1234567

Enter passcode or tap YubiKey

In addition, you can also enter the code shown in your Duo app for UMIACS, the code shown on a registered hardware token, or tap your YubiKey to emit a code:

Code shown in Duo app or hardware token

Duo app code.jpg

(if in the Duo app)

Enter a passcode or select one of the following options:

 1. Duo Push to XXX-XXX-1234
 2. Duo Push to iPad (iOS)
 3. Phone call to XXX-XXX-1234
 4. SMS passcodes to XXX-XXX-1234

Passcode or option (1-4): 672239

Duo token.png

(if using a hardware token)

Enter a passcode or select one of the following options:

 1. Duo Push to XXX-XXX-1234
 2. Duo Push to iPad (iOS)
 3. Phone call to XXX-XXX-1234
 4. SMS passcodes to XXX-XXX-1234

Passcode or option (1-4): 123456

YubiKey tap

Simply tap the sensor on your YubiKey plugged into the device you are using to SSH to have it emit a string of characters and automatically hit Enter.

Enter a passcode or select one of the following options:

 1. Duo Push to XXX-XXX-1234
 2. Duo Push to iPad (iOS)
 3. Phone call to XXX-XXX-1234
 4. SMS passcodes to XXX-XXX-1234

Passcode or option (1-4): kffuastenhldrhfhadafdarivuntddugrvjvllddjjuget

Wrapping up

After finishing your method of choice for using Duo to multi-factor authenticate, you will be logged in and can operate as normal.

Success. Logging you in...
Last login: Wed Feb 17 12:00:00 2021 from ...
[username@nexusgroup00 ~]$

Subsequent SSH attempts from the window you have already connected via will not require multi-factor authentication, even if the host you are trying to SSH to is another public-facing host. This is because at this point the point of origin for the network traffic behind the connection attempt is coming from within the UMIACS border, rather than the rest of the Internet.

[username@nexusgroup00 ~]$ ssh nexusgroup01.umiacs.umd.edu
username@nexusgroup01.umiacs.umd.edu's password:
Last login: Wed Feb 17 11:59:00 2021 from ...
[username@nexusgroup01 ~]$

Considerations

Since there is now an additional step to log in to our public-facing hosts, we would recommend using a terminal multiplexer such as Screen or Tmux to minimize the number of times you need to multi-factor authenticate. Terminal multiplexers allow you to start several different processes out of one terminal display, and also detach from and later reattach to each of the processes.