Secure Shell [SSH]

Secure Shell (SSH) Protocol is a protocol for secure network communications designed to be relatively simple and inexpensive to implement. The initial version, SSH1, focused on providing a secure remote logon facility to replace Telnet and other remote logon schemes that provided no security.

SSH also provides a more general client-server capability and can be used to secure such network functions as file transfer and e-mail.

A new version, SSH2, provides a standardized definition of SSH and improves on SSH1 in numerous ways. SSH2 is documented as a proposed standard in RFCs 4250 through.

SSH client and server applications are widely available for most operating systems. It has become the method of choice for remote login and X tunneling and is rapidly becoming one of the most pervasive applications for encryption technology outside of embedded systems. SSH is organized as three protocols that typically run on top of TCP (Figure 1):

· Transport Layer Protocol: Provides server authentication, data confidentiality, and data integrity with forward secrecy (that is, if a key is compromised during one
session, the knowledge does not affect the security of earlier sessions); the transport layer may optionally provide compression
· User Authentication Protocol: Authenticates the user to the server

· Connection Protocol: Multiplexes multiple logical communications channels over a single underlying SSH connection
 Components of SSH
 SSH Packet Format

0 comments