Secure Shell2

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 11

Secure Shell

Secure Shell

 Secure Shell (SSH) is a secure application


program that can be used today for several
purposes such as remote logging and file
transfer
 it was originally designed to replace TELNET
 There are two versions of SSH: SSH-1 and
SSH-2, which are totally incompatible
 The first version, SSH-1, is now deprecated
because of security flaws in it.
Components
1. SSH Transport-Layer Protocol
(SSH-TRANS)

 SSH first uses a protocol that creates a secured


channel on top of the TCP. This new layer is an
independent protocol referred to as SSH-TRANS
 When the procedure implementing this protocol
is called, the client and server first use the TCP
protocol to establish an insecure connection.
Then they exchange several security parameters
to establish a secure channel on top of the TCP
services provided by SSH-TRANS

1. Privacy or confidentiality of the message exchanged


2. Data integrity, which means that it is guaranteed that
the messages exchanged between the client and
server are not changed by an intruder
3. Server authentication, which means that the client is
now sure that the server is the one that it claims to be
4. Compression of the messages, which improves the efficiency of
the system andmakes attack more difficult
SSH Authentication Protocol (SSH-
AUTH)
 Now, SSH can call another procedure that can
authenticate the client for the server
 Authentication starts with the client, which sends a
request message to the server. The request includes the
user name, server name, the method of authentication,
and the required data.
 The server responds with either a success message,
which confirms that the client is authenticated, or a failed
message, which means that the process needs to be
repeated with a new request message.
SSH Connection Protocol (SSH-
CONN)

 One of the services provided by the SSH-CONN


protocol is multiplexing.
 SSH-CONN takes the secure channel established
by the two previous protocols and lets the client
create multiple logical channels over it.
 Each channel can be used for a different purpose,
such as remote logging, file transfer, and so on.
Applications

 SSH for Remote Loggin


Eg- PuTTy
 SSH for File Transfer – Secure File Transfer
Program (sftp) –
The sftp application program uses
one of the channels provided by the SSH to
transfer files
 Port Forwarding - The SSH port forwarding
mechanism creates a tunnel through which the
messages belonging to other protocols can
travel
Format of the SSH Packets

You might also like