SSH - Secure ShellWhat is SSH?Slide 3Why Use SSH?VulnerabilitiesResourcesSSH - Secure ShellCecilia FlyCSIS 4490 Linux System AdministrationWhat is SSH?SSH, or Secure Shell, is a program that allows you to securely login to a remote computer over a networkFunctionally similar to telnet, it was designed to replace the traditional rsh, rlogin, rcpUses strong authentication, public key encryption, and various ciphers to insure integrityWhat is SSH?There are currently two versions of SSH available: SSH1 and SSH2, with advantages and disadvantages to each version.SSH can provide secure channels for ftp and telnet through tunneling Provides secure X Windows SessionsAvailable for UNIX/Linux, Windows, Macintosh, and some browser-based clientsWhy Use SSH?The transmission of data over a connection with a remote computer is not a straight path – it travels through several other machines on its way.Data is sent in clear text and is easily intercepted SSH defends your machine and communicationsVulnerabilitiesMan-in-the-middle attackOtherwise Compromised systemsResourcesSSH Communications Security :http://www.ssh.fi/index.cfmOhio State University: http://www.math.ohio-state.edu/support/ssh/Written by Thomas Koenig: http://www.uni-karlsruhe.de/~ig25/ssh-faq/index.html University of Illinois: http://www.aae.uiuc.edu/systems/ssh.htmlby Kimmo Suominen: http://www.tac.nyc.ny.us/kim/ssh/Ohio State University: http://wks.uts.ohio-state.edu/unix_course/intro-55.html#HEADING55-0Indiana University: http://www.cs.indiana.edu/docproject/zen/zen-1.0_7.htmlRSA Security:
View Full Document