Differences
This shows you the differences between the selected revisions of the page.
2004-12-15 | 2004-12-15 | ||
created (martin) | no summary (martin) | ||
Line 1: | Line 1: | ||
====== Understanding SSH ====== | ====== Understanding SSH ====== | ||
+ | SSH is a cryptographically protected remote login protocol | ||
+ | designed to replace the insecure telnet and rlogin protocols. SSH | ||
+ | provides strong protection against password sniffing and third party | ||
+ | session monitoring, better protecting your authentication credentials | ||
+ | and privacy. In addition to protecting your passwords and your privacy, | ||
+ | SSH offers additional authentication methods that are considered more | ||
+ | secure than passwords, such as public key authentication, and extensive | ||
+ | protection against spoofing. | ||
+ | |||
+ | ===== Authentication in SSH ===== | ||
+ | SSH servers offer the client a selection of authentication | ||
+ | methods. The server advertises what it supports, and the client | ||
+ | attempts to authenticate over each method that it can support. | ||
+ | Generally, the client will choose methods that are the least intrusive | ||
+ | to the user, if they are available. In most cases, the client provides | ||
+ | the option to choose which methods can be used. | ||
+ | |||
+ | ===== Encryption in SSH ===== | ||
+ | A number of encryption methods can be used by SSH clients and | ||
+ | servers. In the older SSH1 protocol, 3DES and DES are typically used. | ||
+ | SSH2 adds support for additional encryption methods including AES and | ||
+ | Blowfish. By default, AES is used if supported by the server. AES is | ||
+ | considered to be highly secure, however substantial processor overhead | ||
+ | is involved in performing AES encryption. Blowfish is also considered | ||
+ | secure, but with less computational overhead, it's also theoretically | ||
+ | easier to perform a brute-force attack. Depending on your security and | ||
+ | performance requirements, you may wish to configure WinSCP to prefer | ||
+ | the Blowfish algorithm. 3DES and DES are used with SSH1 servers. DES | ||
+ | is widely regarded as insecure, as the resources to perform an | ||
+ | exhaustive brute-force attack have been well within the realm of | ||
+ | commercial feasibility for some time. | ||
+ | |||
+ | ===== SSH Protocols ===== | ||
+ | Two major versions of the SSH protocol are in widespread use. | ||
+ | The SSH1 protocol is an older version of the SSH protocol that's still | ||
+ | widely supported despite its age and some technical issues. The SSH2 | ||
+ | protocol has become the de-facto standard for most installations, | ||
+ | although there are still a few systems out there only supporting SSH1. | ||
+ | Additionally, many sites that use SSH2 now disable the SSH1 protocol | ||
+ | for security reasons. | ||
+ | |||
+ | The default setting in WinSCP is to prefer SSH2 and negotiate | ||
+ | down to SSH1 if SSH2 is not available. If the majority of systems you | ||
+ | connect to are using SSH2, you may wish to change this setting in the | ||
+ | SSH preferences. | ||
+ | |||
+ | ===== Compression ===== | ||
+ | SSH supports compression of the data stream between the client | ||
+ | and the server. On slow links, this may increase throughput, however, | ||
+ | with faster connections the added CPU overhead may actually result in | ||
+ | slower transfers, particularly depending on the type of data being | ||
+ | transferred - large text files may still benefit significantly, while | ||
+ | binaries transfer may actually transfer more slowly. You may wish to | ||
+ | experiment to find what works best in your situation. Compression may | ||
+ | also improve security slightly, in part by rendering known-cyphertext | ||
+ | attacks more difficult to execute and by providing less data for | ||
+ | cryptanalysis. | ||
+ |