Secure Shell: Difference between revisions
No edit summary |
|||
Line 2: | Line 2: | ||
<!-- Edit the stack image at: Template:IPstack --> |
<!-- Edit the stack image at: Template:IPstack --> |
||
In [[computing]], '''Secure shell''', or '''SSH''', is both a [[computer program]] and an associated [[network protocol]] designed for logging into and executing commands on a remote computer. It is intended to replace the earlier [[rlogin]], [[telnet]] and [[rsh]] protocols, and provides secure [[encryption|encrypted]] [[communications]] between two untrusted hosts over an insecure network. [[X11]] connections and arbitrary [[Transmission Control Protocol|TCP]] ports can also be forwarded over the [[secure channel]], and files can be transferred using the associated [[secure copy|scp]] or [[SSH file transfer protocol|sftp]] programs. |
In [[computing]], '''Secure shell''', or '''SSH''', is both a [[computer program]] and an associated [[network protocol]] designed for logging into and executing commands on a remote computer. It is intended to replace the earlier [[rlogin]], [[telnet]] and [[rsh]] protocols, and provides secure [[encryption|encrypted]] [[communications]] between two untrusted hosts over an insecure network. [[X11]] connections and arbitrary [[Transmission Control Protocol|TCP]] ports can also be forwarded over the [[secure channel]], and files can be transferred using the associated [[secure copy|scp]] or [[SSH file transfer protocol|sftp]] programs. The standard TCP port that an ssh server listens to is port 21. |
||
The first version of the protocol (now called '''SSH-1''') was designed, and the first software written, by [[Tatu Ylönen]] from [[Espoo]], [[Finland]] in [[1995]]. He soon formed a company called ''[[SSH Communications Security]] Oy'' to exploit this innovation. The original version of the SSH software used various pieces of [[free software]], such as [[GNU Multi-Precision Library|GNU libgmp]], but later versions released by SSH Secure Communications evolved into increasingly [[proprietary software]]. SSH Communications Security subsequently relicensed SSH to ''[[F-Secure]] Oy'' (formerly known as ''Data Fellows Oy''). SSH Secure Communications has a USA subsidiary in [[Palo Alto, California]]. |
The first version of the protocol (now called '''SSH-1''') was designed, and the first software written, by [[Tatu Ylönen]] from [[Espoo]], [[Finland]] in [[1995]]. He soon formed a company called ''[[SSH Communications Security]] Oy'' to exploit this innovation. The original version of the SSH software used various pieces of [[free software]], such as [[GNU Multi-Precision Library|GNU libgmp]], but later versions released by SSH Secure Communications evolved into increasingly [[proprietary software]]. SSH Communications Security subsequently relicensed SSH to ''[[F-Secure]] Oy'' (formerly known as ''Data Fellows Oy''). SSH Secure Communications has a USA subsidiary in [[Palo Alto, California]]. |
Revision as of 21:44, 12 November 2004
Internet protocol suite |
---|
Application layer |
Transport layer |
Internet layer |
Link layer |
In computing, Secure shell, or SSH, is both a computer program and an associated network protocol designed for logging into and executing commands on a remote computer. It is intended to replace the earlier rlogin, telnet and rsh protocols, and provides secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP ports can also be forwarded over the secure channel, and files can be transferred using the associated scp or sftp programs. The standard TCP port that an ssh server listens to is port 21.
The first version of the protocol (now called SSH-1) was designed, and the first software written, by Tatu Ylönen from Espoo, Finland in 1995. He soon formed a company called SSH Communications Security Oy to exploit this innovation. The original version of the SSH software used various pieces of free software, such as GNU libgmp, but later versions released by SSH Secure Communications evolved into increasingly proprietary software. SSH Communications Security subsequently relicensed SSH to F-Secure Oy (formerly known as Data Fellows Oy). SSH Secure Communications has a USA subsidiary in Palo Alto, California.
A later version of the protocol was released under the name SSH-2. It is being standardised by the IETF "secsh" working group, and features both security and feature improvements over SSH-1. Examples of the former are Diffie-Hellman key exchange and strong integrity checking via MACs; of the latter, the ability to run any number of shell sessions over a single SSH connection. [1]
The program is a common Unix shell program for client connections, accompanied by a daemon for accepting remote connections. Implementations exist for most modern platforms, including Microsoft Windows (where one of the most popular is PuTTY) and Mac OS. There are commercial versions, freeware versions, and open source versions.
List of implementations
- Lsh, the GNU Projects' implementation of SSH. (client and server)
- OpenSSH is an open source implementation of SSH. OpenSSH derives from the original, free implementation of SSH. (client and server)
- PuTTY (client)
- SSH Tectia Client [2]
- PenguiNet [3]
- SSHDOS [4]
- WinSCP [5] (file transfer client)
- JavaSSH [6]
References
This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.
See also
- Corkscrew is a tool enabling the user to run SSH over HTTPS proxy servers.
- Connect.c is a small C program to enable the user to run SSH over HTTPS proxy servers.
- Proxytunnel is another program, but of a more generic nature.
External links
- IETF working group (for SSH-2)