Preview

Explanation of Ssh

Good Essays
Open Document
Open Document
835 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Explanation of Ssh
What is SSH?
SSH is a Secure Shell that uses a secure encrypted communication protocol designed to replace older insecure protocols like telnet, rsh, and ftp. SSH authentication is done with a username and password combination, which is the default. This is the most simplistic usage we will see.
$ ssh user@secureserver
SSH comes with all Linux distributions as well as other Unix variants. SSH is not a complete security solution and it will not protect against trojans, viruses, etc.
Why would you want to replace telnet and remote login with SSH?
SSH (Secure Shell) is a protocol that can be used to log into a remote machine and provide secure encrypted communications between the Virtual Server and the local computer. The communication is made via encrypted channels. Telnet on the other hand communicates without any encryption, allowing a sniffer to capture information, e.g. user names and passwords. This is why SSH is preferred over Telnet.
SSH uses a public and private key on each system. The private key is the one which you should never give away access to and the public key is the one which you will put on other machines you want to log into. For any given public key, only one possible private key can be its’ other half. The first time a user uses SSH to connect to a remote system, their SSH client program exchanges the public keys, unless keys have been exchanged manually. If keys are exchanged over the network during the first connection, the user essentially trusts the security of the network during the key exchange. On subsequent connections to the same system, the SSH program will check that the keys haven’t changed to ensure that it is still the same system.
This is an example of a Telnet unencrypted client-server session:

This is an example of an encrypted SSH client-server session:

How is SSH configured on a Linux computer?
To configure SSH on a Linux computer you need to open ssh server to install it to first work on SSH. Please note that

You May Also Find These Documents Helpful

  • Good Essays

    Entities can have one or more private-public key pairs and associated public key certificates. A certificate is a statement issued by a certification authority according to a policy that binds an entity 's public key to its name for a period of time. (You 'll learn more about policies later in the chapter.) Another entity that trusts this CA also trusts that the public key belongs to the named entity. When entity A is presented with a certificate by entity B, entity A can tell from the certificate name that the certificate belongs to a legitimate user of the system. Entity B proves he or she is the legitimate holder of the certificate by proving his or her knowledge of the associated private key. Entity A can optionally check the certificate 's current validity by looking it up on the CA 's CRL.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    7. How is the passwd file used, and what fields make up its content? Explain.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When a client connects to the MySQL server, the server uses the username provided by the client and the client host to select the appropriate account row from the mysql.user table. It then uses this row to authenticate the client. Before MySQL 5.5.7, the server authenticates the password provided by the client against the Password column of the account row.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NAS, unlike normal servers, do not require a keyboard, mouse, or monitor. They are usually managed from a remote terminal accessed via the NAS network connection (Waring 2007). Some NAS systems use a web browser interface that uses the user’s web browser to interact with the NAS. Other systems use software that the manufacturer develops just for managing the NAS.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    |Comments on security |Linux can use firewalls, IPS, IDS, and antivirus software. It can also be configured to |…

    • 757 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Provides file management capabilities for the system Software that provides user interface with the OS 10. 11. 12. Would you set up a GUI on a server system? Why or why not? What is a terminal emulator? Which commands can you use to determine who is logged in on a specific…

    • 680 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Shell is a piece of software that provides an interface for users of an operating system. Shell provides access to the services of a kernel. Shell makes the user’s job faster and easier in many ways.…

    • 1455 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    comparison matrix

    • 439 Words
    • 2 Pages

    Security-there is a firewall tool provided with a task bar that lets the user know of any security issues. Shell- Is environment friendly for the user and has functions that run like a PC. Rescue-This feature which is in the disk of the program, can unlock a system to let the user continue their work.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In the Microsoft SQL Server, authentication process occures when someone wanted to make a connection to Microsoft SQL Server. User and password is required for some one to be able to access resources of the Microsoft SQL Server. Once the authentication process finishes, Microsoft SQL Server takes control of authorizing user’s can access to object ( Database, table, trigger and function ) and data in the system…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Shell -is software that provide an interface for users of an operating system which provides access to the services of kernel.…

    • 1981 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Remote Desktop Protocol

    • 297 Words
    • 2 Pages

    Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays

Related Topics