Secure Shell (SSH) is a secure application used for remote logging and file transfer that was designed to replace the insecure TELNET protocol. SSH has two versions - SSH-1 is now deprecated due to security flaws, while SSH-2 uses multiple protocols to establish an encrypted channel, authenticate the client, and allow secure remote access and file transfer.
Secure Shell (SSH) is a secure application used for remote logging and file transfer that was designed to replace the insecure TELNET protocol. SSH has two versions - SSH-1 is now deprecated due to security flaws, while SSH-2 uses multiple protocols to establish an encrypted channel, authenticate the client, and allow secure remote access and file transfer.
Secure Shell (SSH) is a secure application used for remote logging and file transfer that was designed to replace the insecure TELNET protocol. SSH has two versions - SSH-1 is now deprecated due to security flaws, while SSH-2 uses multiple protocols to establish an encrypted channel, authenticate the client, and allow secure remote access and file transfer.
Secure Shell (SSH) is a secure application used for remote logging and file transfer that was designed to replace the insecure TELNET protocol. SSH has two versions - SSH-1 is now deprecated due to security flaws, while SSH-2 uses multiple protocols to establish an encrypted channel, authenticate the client, and allow secure remote access and file transfer.
Download as PPT, PDF, TXT or read online from Scribd
Download as ppt, pdf, or txt
You are on page 1of 11
Secure Shell
Secure Shell
Secure Shell (SSH) is a secure application
program that can be used today for several purposes such as remote logging and file transfer it was originally designed to replace TELNET There are two versions of SSH: SSH-1 and SSH-2, which are totally incompatible The first version, SSH-1, is now deprecated because of security flaws in it. Components 1. SSH Transport-Layer Protocol (SSH-TRANS)
SSH first uses a protocol that creates a secured
channel on top of the TCP. This new layer is an independent protocol referred to as SSH-TRANS When the procedure implementing this protocol is called, the client and server first use the TCP protocol to establish an insecure connection. Then they exchange several security parameters to establish a secure channel on top of the TCP services provided by SSH-TRANS
1. Privacy or confidentiality of the message exchanged
2. Data integrity, which means that it is guaranteed that the messages exchanged between the client and server are not changed by an intruder 3. Server authentication, which means that the client is now sure that the server is the one that it claims to be 4. Compression of the messages, which improves the efficiency of the system andmakes attack more difficult SSH Authentication Protocol (SSH- AUTH) Now, SSH can call another procedure that can authenticate the client for the server Authentication starts with the client, which sends a request message to the server. The request includes the user name, server name, the method of authentication, and the required data. The server responds with either a success message, which confirms that the client is authenticated, or a failed message, which means that the process needs to be repeated with a new request message. SSH Connection Protocol (SSH- CONN)
One of the services provided by the SSH-CONN
protocol is multiplexing. SSH-CONN takes the secure channel established by the two previous protocols and lets the client create multiple logical channels over it. Each channel can be used for a different purpose, such as remote logging, file transfer, and so on. Applications
SSH for Remote Loggin
Eg- PuTTy SSH for File Transfer – Secure File Transfer Program (sftp) – The sftp application program uses one of the channels provided by the SSH to transfer files Port Forwarding - The SSH port forwarding mechanism creates a tunnel through which the messages belonging to other protocols can travel Format of the SSH Packets