Difference between revisions of "Secure Shell"

From Wiki @ Karl Jones dot com
Jump to: navigation, search
m (Karl jones moved page SSH to Secure Shell)
(etc)
Line 3: Line 3:
 
This allows a user to run commands on a machine's command prompt without them being physically present near the machine.
 
This allows a user to run commands on a machine's command prompt without them being physically present near the machine.
  
It also allows a user to establish a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server.
+
It also allows a user to establish a secure channel over an insecure network in a [[client-server]] architecture, connecting an SSH client application with an SSH server.
  
 
Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH.
 
Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH.
Line 15: Line 15:
 
The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the [[Internet]], although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH.
 
The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the [[Internet]], although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH.
  
== External Links ==
+
== External links ==
  
 
* [http://en.wikipedia.org/wiki/Secure_Shell SSH] @ Wikipedia
 
* [http://en.wikipedia.org/wiki/Secure_Shell SSH] @ Wikipedia

Revision as of 12:19, 24 May 2015

Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way.

This allows a user to run commands on a machine's command prompt without them being physically present near the machine.

It also allows a user to establish a secure channel over an insecure network in a client-server architecture, connecting an SSH client application with an SSH server.

Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH.

The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it can also be used in a similar fashion on Windows.

SSH was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.

The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet, although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH.

External links

  • SSH @ Wikipedia