Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
8Activity
0 of .
Results for:
No results containing your search query
P. 1
SSH - Secure Shell

SSH - Secure Shell

Ratings: (0)|Views: 201 |Likes:
Published by Peter R. Egli
Overview of the SSH protocol.

SSH (Secure SHell) is a secure replacement for TELNET, rcp, rlogin, rsh (for login, remote execution of
commands, file transfer).
Security-wise SSH provides confidentiality (nobody can read the message content), integrity (guarantee that data is unaltered in transit) and authentication (of client and server). This provides protection against many of the possible attack vectors like IP spoofing, DNS spoofing, Password interception and eavesdropping.

SSH exists in 2 versions. SSH-2 fixes some of the shortcomings of SSH-1 so it should be used in place of SSH-1.
SSH also comes with features that in itself raise security concerns like tunneling and port forwarding.
Overview of the SSH protocol.

SSH (Secure SHell) is a secure replacement for TELNET, rcp, rlogin, rsh (for login, remote execution of
commands, file transfer).
Security-wise SSH provides confidentiality (nobody can read the message content), integrity (guarantee that data is unaltered in transit) and authentication (of client and server). This provides protection against many of the possible attack vectors like IP spoofing, DNS spoofing, Password interception and eavesdropping.

SSH exists in 2 versions. SSH-2 fixes some of the shortcomings of SSH-1 so it should be used in place of SSH-1.
SSH also comes with features that in itself raise security concerns like tunneling and port forwarding.

More info:

Categories:Types, Presentations
Published by: Peter R. Egli on Dec 04, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/02/2015

pdf

text

original

 
© Peter R. Egli 2015 1/20 Rev. 2.50
SSH - Secure Shell
indigoo.com
 
OVERVIEW OF THE SECURE SHELL PROTOCOL FOR SECURE REMOTE SESSIONS AND PORT FORWARDING
SSH
SECURE SHELL
Peter R. Egli INDIGOO.COM
 
© Peter R. Egli 2015 3/20 Rev. 2.50
SSH - Secure Shell
indigoo.com
1. SSH in a nutshell (1/2)
Why SSH? SSH (RFC4250 et.al.) is a secure replacement for TELNET, rcp, rlogin and rsh for login, remote execution of commands and file transfer. SSH security: Security-wise SSH provides: 1. Confidentiality (nobody can read the message content). 2. Integrity (guarantee that data is unaltered on transit). 3. Authentication (of client and server). This provides protection against: - IP spoofing - IP source routing - DNS spoofing - Password interception - Eavesdropping SSH versions: There exist 2 (incompatible) versions of SSH: - SSH-1 - SSH-2 SSH-1.x (1.5, 1.99) are updates of version 1 and thus compatible with SSH-1.

Activity (8)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Sarah Jain liked this
neniey liked this
Sarah Jain liked this
Peter R. Egli liked this
Lampdba Diop liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->