Differences
This shows you the differences between the selected revisions of the page.
| 2005-05-04 | 2005-05-04 | ||
| 3.7.5 key verification message format (martin) | 3.7.5 ssh version syntax (martin) | ||
| Line 17: | Line 17: | ||
| the option to choose which methods can be used. In WinSCP you can configure this on [[ui_login_authentication|Login dialog]]. | the option to choose which methods can be used. In WinSCP you can configure this on [[ui_login_authentication|Login dialog]]. | ||
| - | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password. | + | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. |
| ==== Using Public Keys for Authentication ==== | ==== Using Public Keys for Authentication ==== | ||
| Line 56: | Line 56: | ||
| ===== Encryption in SSH ===== | ===== Encryption in SSH ===== | ||
| A number of encryption methods can be used by SSH clients and | A number of encryption methods can be used by SSH clients and | ||
| - | servers. In the older SSH1 protocol, 3DES and DES are typically used. | + | servers. In the older SSH-1 protocol, 3DES and DES are typically used. |
| - | SSH2 adds support for additional encryption methods including AES and | + | SSH-2 adds support for additional encryption methods including AES and |
| Blowfish. By default, AES is used if supported by the server. AES is | Blowfish. By default, AES is used if supported by the server. AES is | ||
| considered to be highly secure, however substantial processor overhead | considered to be highly secure, however substantial processor overhead | ||
| Line 64: | Line 64: | ||
| easier to perform a brute-force attack. Depending on your security and | easier to perform a brute-force attack. Depending on your security and | ||
| performance requirements, you may wish to configure WinSCP to prefer | performance requirements, you may wish to configure WinSCP to prefer | ||
| - | the Blowfish algorithm. 3DES and DES are used with SSH1 servers. DES | + | the Blowfish algorithm. 3DES and DES are used with SSH-1 servers. DES |
| is widely regarded as insecure, as the resources to perform an | is widely regarded as insecure, as the resources to perform an | ||
| exhaustive brute-force attack have been well within the realm of | exhaustive brute-force attack have been well within the realm of | ||
| Line 71: | Line 71: | ||
| ===== SSH Protocols ===== | ===== SSH Protocols ===== | ||
| Two major versions of the SSH protocol are in widespread use. | Two major versions of the SSH protocol are in widespread use. | ||
| - | The SSH1 protocol is an older version of the SSH protocol that's still | + | The SSH-1 protocol is an older version of the SSH protocol that's still |
| - | widely supported despite its age and some technical issues. The SSH2 | + | widely supported despite its age and some technical issues. The SSH-2 |
| protocol has become the de-facto standard for most installations, | protocol has become the de-facto standard for most installations, | ||
| - | although there are still a few systems out there only supporting SSH1. | + | although there are still a few systems out there only supporting SSH-1. |
| - | Additionally, many sites that use SSH2 now disable the SSH1 protocol | + | Additionally, many sites that use SSH-2 now disable the SSH-1 protocol |
| for security reasons. | for security reasons. | ||
| - | The default setting in WinSCP is to prefer SSH2 and negotiate | + | The default setting in WinSCP is to prefer SSH-2 and negotiate |
| - | down to SSH1 if SSH2 is not available. If the majority of systems you | + | down to SSH-1 if SSH-2 is not available. If the majority of systems you |
| - | connect to are using SSH2, you may wish to change this setting in the | + | connect to are using SSH-2, you may wish to change this setting in the |
| SSH preferences. | SSH preferences. | ||