WHAT IS SSH AND HOW IT IS USED

0 0
Read Time:3 Minute, 54 Second

What is SSH?

The Secure Shell protocol version 2, or SSH2, specifies how a client can connect securely to an SSH server, and then use the resulting secure link to access the server’s resources. Among other things, the client can run programs; transfer files; and forward other TCP/IP connections over the secure link.

The SSH2 protocol is a descendant of the SSH v1.x series of protocols. SSH version 2 is standardized at IETF, and the vast majority SSH implementations now support SSH version 2. SSH version 1 is less secure, and is almost no longer being used.

How secure is SSH?

The Secure Shell protocol provides the services of server authentication; encryption; data integrity verification; and client authentication. Server authentication is performed using RSA, DSA, or ECDSA public key algorithms. For encryption and data integrity verification, a number of algorithms are provided which every SSH product can implement in a modular fashion. Client authentication can be performed using a password, a public key, single sign-on Kerberos, and other methods.

The SSH2 protocol specification is publicly available and has been reviewed by several independent implementers. When properly used, the protocol is understood to be secure against all known cryptographic attacks, passive as well as active.

Client vs. server

In internet protocols, the terms client and server have specific technical meanings:

  • client, when speaking of a program, is a program that initiates connections and requests to other computers.
  • server is a program that waits to receive connections and handles requests.

client may run all of the time or some of the time, depending on when a user needs it. A client may more likely run on a desktop computer, but can also run on a server computer if this computer needs to send out request or initiate connections.

server usually runs all the time, in the background. A server may more likely run on a computer in a data center. However, it is also perfectly feasible to use server programs on a desktop computer.

If you are looking for SSH software, you are looking for a server if you want to set up a computer to receive connections from other people and their computers. You are looking for a client if you wish to connect, using SSH, to someone else’s computer.

SSH compared to SSL/TLS

SSH and TLS/SSL are different protocols used for similar purposes. Both protocols are used to authenticate communicating parties and secure data during transport.

SSL/TLS tend to use X.509 certificates, is based on ASN.1 encodings, and is most commonly used to as a security layer for HTTP, SMTP, and FTP traffic.

The SSH protocol tends to use public keys without a certificate infrastructure, is based on a simpler binary encoding, and tends to be used as a security layer for SFTP and SCP file transfers, terminal shell access, and forwarding of connections for other applications.

SSH can be perceived as a less clunky version of TLS. Due to its deliberate independence from X.509 certificates, SSH lends itself well to connections between entities with an existing trust relationship, where TLS does poorly. TLS lends itself better to connections between strangers.

SSH features

SSH is a highly flexible protocol, and many different types of services can use it. The protocol’s open architecture allows these services to run at the same time without impeding one another.

An SSH client and server can transfer files using the protocols SCP and SFTP, which run on top of an established SSH session. While SCP is the old Unix rcp utility transplanted onto a different transport, SFTP is a flexible remote file access protocol that can be used in advanced ways. SFTP is better standardized and widely supported, so often software that provides an SCP-like interface really uses SFTP instead.

Note that SFTP is unrelated to FTP, or to FTP over TLS/SSL. The protocols are independent and very different.

A frequently used service is the remote console. This involves allocating a channel within the SSH session, which is then used as transport for a terminal protocol such as vt100 or xterm. The client displays to the user a console window within which the user can execute command line programs on the server.

SSH also provides exec requests. An exec request executes a program on the server like a remote console, but without expectation of interactive input. Exec requests are useful for automated remote administration.

Another popular SSH function is port forwarding, or TCP/IP connection tunneling. With SSH port forwarding, it is possible to secure a TCP/IP connection established by an independent application that would otherwise be vulnerable to network attacks.

Loading

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

About Author

  • Related Posts

    [Continuation} : five current global situations and how making Physics and Geography compulsory in education could provide solutions

    1. Situation: Climate Change and Global Warming Problem: Rising global temperatures, melting polar ice caps, and extreme weather events are wreaking havoc on ecosystems and human communities. Many people lack…

    Loading

    Read more

    Continue reading

    Average Rating

    5 Star
    0%
    4 Star
    0%
    3 Star
    0%
    2 Star
    0%
    1 Star
    0%

    Incase you missed

    [Continuation} : five current global situations and how making Physics and Geography compulsory in education could provide solutions

    [Continuation} : five current global situations and how making Physics and Geography compulsory in education could provide solutions

    [Continuation]: Current Challenges in Making Physics and Geography Compulsory

    [Continuation]: Current Challenges in Making Physics and Geography Compulsory

    [Resource] : Why Physics and Geography Should Be Compulsory Like Mathematics in Education

    [Resource] : Why Physics and Geography Should Be Compulsory Like Mathematics in Education

    Explainer : What Proxies are and their usage

    Explainer : What Proxies are and their usage

    MPESA consumer, secret and passkeys {Safaricom M-pesaWeBPortal} for API integration {Daraja 2.0}

    MPESA consumer, secret and passkeys {Safaricom M-pesaWeBPortal} for API integration {Daraja 2.0}

    [LINKTREE] 2024 PAST PAPERS , NOTES ,RESOURCE,REVISION,EXAMINATIONS

    [LINKTREE] 2024 PAST PAPERS , NOTES ,RESOURCE,REVISION,EXAMINATIONS

    2024 PAST PAPERS , NOTES ,RESOURCE,REVISION,EXAMINATIONS

    2024 PAST PAPERS , NOTES ,RESOURCE,REVISION,EXAMINATIONS

    Shipbrokers Breach of Authority

    Shipbrokers Breach of Authority

    Explain classification of law

    Explain classification of law

    Maritime Terms, Abbreviations and Acronyms [Shipping Terms – Searchable]

    Maritime Terms, Abbreviations and Acronyms [Shipping Terms – Searchable]

    Maritime Terms, Abbreviations and Acronyms [ Shipping Terms]

    Maritime Terms, Abbreviations and Acronyms [ Shipping Terms]

    KCB BANK CODES ACROSS KENYA BY REGION tabular

    KCB BANK CODES ACROSS KENYA BY REGION tabular

    Optimizing Container Stowage Plan for Efficient Cargo Placement on Ships

    Optimizing Container Stowage Plan for Efficient Cargo Placement on Ships

    Choosing Between Managed and Unmanaged Services

    Choosing Between Managed and Unmanaged Services

    Differences Between Managed and UnManaged Services

    Differences Between Managed and UnManaged Services

    How to check KRA PIN using BRS (Ecitizen)

    How to check KRA PIN using BRS (Ecitizen)

    HTML ERROR MESSAGES

    HTML ERROR MESSAGES

    DISCUSS THE SYSTEM OF COURTS IN KENYA

    DISCUSS THE SYSTEM OF COURTS IN KENYA

    GLOSSARY ON INTERNET TERMS

    GLOSSARY ON INTERNET TERMS

    KEYBOARD SHORTCUTS

    KEYBOARD SHORTCUTS

    NESTICT LMS: INTERNET NOTES

    NESTICT LMS: INTERNET NOTES

    REPORTED SPEECH

    REPORTED SPEECH

    [Explainer]: NVMe storage, SSD (SATA SSD), and HDD

    [Explainer]: NVMe storage, SSD (SATA SSD), and HDD

    SSD vs HDD: What’s the difference?

    SSD vs HDD: What’s the difference?

    Enabling Hyper-V on Windows 10

    Enabling Hyper-V on Windows 10

    Discussion : Windows 10 Virtualization

    Discussion : Windows 10 Virtualization

    BLUETOOTH LAN NETWORK

    BLUETOOTH LAN NETWORK

    PROS CONS AND WAYS OF INVESTING IN BITCOIN

    PROS CONS AND WAYS OF INVESTING IN BITCOIN

    What is a cloud service provider

    What is a cloud service provider

    Application Service Provider (ASP) Meaning

    Application Service Provider (ASP) Meaning

    POSTAL CODES – Updated as at July 2024 – PDF

    POSTAL CODES – Updated as at July 2024 – PDF

    POSTAL CODES – Updated as at July 2024

    POSTAL CODES – Updated as at July 2024

    Check your disk space use with the Linux df command

    Check your disk space use with the Linux df command

    Best Places to get Accounting Internship Opportunities

    Best Places to get Accounting Internship Opportunities

    Top Kenyan Based Companies to apply for internship

    Top Kenyan Based Companies to apply for internship

    Credit Scores Quickk FAQs

    Credit Scores Quickk FAQs

    Credit Score Ranges: What Do They Mean?

    Credit Score Ranges: What Do They Mean?

    RANDOMIZING PHONE NUMBERS IN EXCEL

    RANDOMIZING PHONE NUMBERS IN EXCEL

    [Updated 2024] – Passport Application FOR CHILDREN ONLY(PERSONS UNDER 18 YEARS)

    [Updated 2024] – Passport Application FOR CHILDREN ONLY(PERSONS UNDER 18 YEARS)

    [Updated 2024] -Passport Application FOR ADULTS ONLY-PERSONS OVER 18 YEARS

    [Updated 2024] -Passport Application FOR ADULTS ONLY-PERSONS OVER 18 YEARS

    Understanding Tires Load Index vs Load Range on Car Tires

    Understanding Tires Load Index vs Load Range on Car Tires

    Computer Bus: Video

    Computer Bus: Video

    Computer Bus

    Computer Bus

    Types of Computer Network Topology Explained With Diagrams

    Types of Computer Network Topology Explained With Diagrams

    The Functions of PCI Slots

    The Functions of PCI Slots

    Complementary Metal Oxide Semiconductor – CMOS

    Complementary Metal Oxide Semiconductor – CMOS

    The Computer Motherboard and Its Components Explained

    The Computer Motherboard and Its Components Explained

    AI in Education is Best Experiences

    AI in Education is Best Experiences

    Harnessing the Power of Wind Energy

    Harnessing the Power of Wind Energy

    The Golden Gate’s Timeless Majesty

    The Golden Gate’s Timeless Majesty

    Rise of Competitive Video Gaming

    Rise of Competitive Video Gaming

    Ultimate Sports Ground Experience

    Ultimate Sports Ground Experience

    Global Ocean Cleanup Initiatives

    Global Ocean Cleanup Initiatives

    The Enduring Appeal of Gaming Classics

    The Enduring Appeal of Gaming Classics

    The Art of Mindful Eating

    The Art of Mindful Eating

    Classic Video Games Making a Comeback

    Classic Video Games Making a Comeback

    Sustainable Travel for Eco-Friendly Tourism

    Sustainable Travel for Eco-Friendly Tourism

    Mind-Body Connection for Meditation

    Mind-Body Connection for Meditation

    Future of Work Like Remote Collaboration Tools

    Future of Work Like Remote Collaboration Tools

    Innovations in 3D Printing

    Innovations in 3D Printing