Secure Shell (SSH)
1. Introduction
Open source SSH version 1 was invented in 1995 by Tatu Ylonen to replace the more insecure Telnet, Remote Shell (RSH) and Remote
Login (Rlogin). The data traffic is encrypted both ways and provides security so that paswords and commands cannot be traced by a
network analyser. SSH also provides the ability to authenticate the user on the server thereby preventing hi-jacking of a user session
by someone in between. In addition you can do the following with SSH:
- You can use Public Key Authentication instead of password authentication.
- Compression can be applied to the traffic.
- Other TCP ports can be forwarded so that protocols such as FTP and X.11 can be used over the SSH session.
Version 2 of SSH was developed by the IETF.
|