Secure Shell (SSH)
Protocol is a protocol for secure network communications designed to be relatively
simple and inexpensive to implement. The initial version, SSH1, focused on providing
a secure remote logon facility to replace Telnet and other remote logon schemes
that provided no security.
SSH also
provides a more general client-server capability and can be used to secure such
network functions as file transfer and e-mail.
A new version,
SSH2, provides a standardized definition of SSH and improves on SSH1 in numerous
ways. SSH2 is documented as a proposed standard in RFCs 4250 through.
SSH client and
server applications are widely available for most operating systems. It has become
the method of choice for remote login and X tunneling and is rapidly becoming
one of the most pervasive applications for encryption technology outside of
embedded systems. SSH is organized as three protocols that typically run on top
of TCP (Figure 1):
· Transport Layer
Protocol: Provides
server authentication, data confidentiality, and data integrity with forward
secrecy (that is, if a key is compromised during one
session, the
knowledge does not affect the security of earlier sessions); the transport layer
may optionally provide compression
· User
Authentication Protocol: Authenticates the user to the server
· Connection
Protocol: Multiplexes
multiple logical communications channels over a single underlying SSH
connection
Components of SSHSSH Packet Format
0 comments