Secure Shell Protocol (SSH) Protocol
A Secure Shell Protocol (SSH) Protocol is a network protocol for secure data communication (between a ssh client and ssh server) that uses public-key cryptography.
- Context:
- It makes use of an SSH Key Pairs (a public key and a private key).
- It can be implemented by an SSH Software System.
- …
- Counter-Example(s):
- a Telnet Protocol.
- an FTP Protocol.
- an HTTP Protocol.
- See: SSH Tunnel, SCP Protocol, SCP Client, VPN Protocol.
References
2011
- http://en.wikipedia.org/wiki/Secure_Shell
- Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively).[1] The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2.
The best-known application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion for accounts on Windows. It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.[2] The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.
- Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively).[1] The protocol specification distinguishes between two major versions that are referred to as SSH-1 and SSH-2.
- ↑ Network Working Group of the IETF, January 2006, RFC 4252, The Secure Shell (SSH) Authentication Protocol
- ↑ SSH Hardens the Secure Shell, Serverwatch.com