Secure Shell: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris No edit summary |
imported>Sandy Harris No edit summary |
||
Line 19: | Line 19: | ||
| date = January 2006 | | date = January 2006 | ||
| url = http://www.ietf.org/rfc/rfc4253.txt | | url = http://www.ietf.org/rfc/rfc4253.txt | ||
}}</ref> <ref>{{citation | |||
| id = rfc4254 | |||
| author = T. Ylonen, C. Lonvick | |||
| title = The Secure Shell (SSH) Connection Protocol | |||
| date = January 2006 | |||
| url = http://www.ietf.org/rfc/rfc4254.txt | |||
}}</ref> <ref>{{citation | |||
| id = rfc4255 | |||
| author = J. Schlyter, W. Griffin | |||
| title = Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints | |||
| date = January 2006 | |||
| url = http://www.ietf.org/rfc/rfc4255.txt | |||
}}</ref> <ref>{{citation | }}</ref> <ref>{{citation | ||
| id = rfc4716 | | id = rfc4716 |
Revision as of 21:21, 11 September 2010
The Secure Shell or SSH is a network protocol for secure remote login, providing an encrypted connection instead of the unencrypted, and therefore insecure, connection of telnet.
The protocol is documented in a series of RFCs. [1] [2] [3] [4] [5] [6]
Most Unix-based systems include an SSH client, and often a server as well. A client for Windows is Putty.
References
- ↑ T. Ylonen, C. Lonvick (January 2006), The Secure Shell (SSH) Protocol Architecture, rfc4251
- ↑ T. Ylonen, C. Lonvick (January 2006), The Secure Shell (SSH) Authentication Protocol, rfc4252
- ↑ T. Ylonen, C. Lonvick (January 2006), The Secure Shell (SSH) Transport Layer Protocol, rfc4253
- ↑ T. Ylonen, C. Lonvick (January 2006), The Secure Shell (SSH) Connection Protocol, rfc4254
- ↑ J. Schlyter, W. Griffin (January 2006), Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints, rfc4255
- ↑ J. Galbraith, R. Thayer (November 2006), The Secure Shell (SSH) Public Key File Format, rfc4716