Differences
This shows you the differences between the selected revisions of the page.
2005-05-04 | 2005-05-04 | ||
3.7.5 key verification message format (martin) | 3.7.5 ssh version syntax (martin) | ||
Line 17: | Line 17: | ||
the option to choose which methods can be used. In WinSCP you can configure this on [[ui_login_authentication|Login dialog]]. | the option to choose which methods can be used. In WinSCP you can configure this on [[ui_login_authentication|Login dialog]]. | ||
- | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password. | + | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. |
==== Using Public Keys for Authentication ==== | ==== Using Public Keys for Authentication ==== | ||
Line 56: | Line 56: | ||
===== Encryption in SSH ===== | ===== Encryption in SSH ===== | ||
A number of encryption methods can be used by SSH clients and | A number of encryption methods can be used by SSH clients and | ||
- | servers. In the older SSH1 protocol, 3DES and DES are typically used. | + | servers. In the older SSH-1 protocol, 3DES and DES are typically used. |
- | SSH2 adds support for additional encryption methods including AES and | + | SSH-2 adds support for additional encryption methods including AES and |
Blowfish. By default, AES is used if supported by the server. AES is | Blowfish. By default, AES is used if supported by the server. AES is | ||
considered to be highly secure, however substantial processor overhead | considered to be highly secure, however substantial processor overhead | ||
Line 64: | Line 64: | ||
easier to perform a brute-force attack. Depending on your security and | easier to perform a brute-force attack. Depending on your security and | ||
performance requirements, you may wish to configure WinSCP to prefer | performance requirements, you may wish to configure WinSCP to prefer | ||
- | the Blowfish algorithm. 3DES and DES are used with SSH1 servers. DES | + | the Blowfish algorithm. 3DES and DES are used with SSH-1 servers. DES |
is widely regarded as insecure, as the resources to perform an | is widely regarded as insecure, as the resources to perform an | ||
exhaustive brute-force attack have been well within the realm of | exhaustive brute-force attack have been well within the realm of | ||
Line 71: | Line 71: | ||
===== SSH Protocols ===== | ===== SSH Protocols ===== | ||
Two major versions of the SSH protocol are in widespread use. | Two major versions of the SSH protocol are in widespread use. | ||
- | The SSH1 protocol is an older version of the SSH protocol that's still | + | The SSH-1 protocol is an older version of the SSH protocol that's still |
- | widely supported despite its age and some technical issues. The SSH2 | + | widely supported despite its age and some technical issues. The SSH-2 |
protocol has become the de-facto standard for most installations, | protocol has become the de-facto standard for most installations, | ||
- | although there are still a few systems out there only supporting SSH1. | + | although there are still a few systems out there only supporting SSH-1. |
- | Additionally, many sites that use SSH2 now disable the SSH1 protocol | + | Additionally, many sites that use SSH-2 now disable the SSH-1 protocol |
for security reasons. | for security reasons. | ||
- | The default setting in WinSCP is to prefer SSH2 and negotiate | + | The default setting in WinSCP is to prefer SSH-2 and negotiate |
- | down to SSH1 if SSH2 is not available. If the majority of systems you | + | down to SSH-1 if SSH-2 is not available. If the majority of systems you |
- | connect to are using SSH2, you may wish to change this setting in the | + | connect to are using SSH-2, you may wish to change this setting in the |
SSH preferences. | SSH preferences. | ||