ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2005-05-04 2005-05-04
3.7.5 key verification message format (martin) 3.7.5 ssh version syntax (martin)
Line 17: Line 17:
the option to choose which methods can be used. In WinSCP you can configure this on [[ui_login_authentication|Login dialog]]. the option to choose which methods can be used. In WinSCP you can configure this on [[ui_login_authentication|Login dialog]].
-The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH2 only), TIS or Cryptocard (SSH1 only), password.+The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), public key (using Pageant), public key (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.
==== Using Public Keys for Authentication ==== ==== Using Public Keys for Authentication ====
Line 56: Line 56:
===== Encryption in SSH ===== ===== Encryption in SSH =====
A number of encryption methods can be used by SSH clients and A number of encryption methods can be used by SSH clients and
-servers. In the older SSH1 protocol, 3DES and DES are typically used. +servers. In the older SSH-1 protocol, 3DES and DES are typically used. 
-SSH2 adds support for additional encryption methods including AES and+SSH-2 adds support for additional encryption methods including AES and
Blowfish. By default, AES is used if supported by the server. AES is Blowfish. By default, AES is used if supported by the server. AES is
considered to be highly secure, however substantial processor overhead considered to be highly secure, however substantial processor overhead
Line 64: Line 64:
easier to perform a brute-force attack. Depending on your security and easier to perform a brute-force attack. Depending on your security and
performance requirements, you may wish to configure WinSCP to prefer performance requirements, you may wish to configure WinSCP to prefer
-the Blowfish algorithm. 3DES and DES are used with SSH1 servers. DES+the Blowfish algorithm. 3DES and DES are used with SSH-1 servers. DES
is widely regarded as insecure, as the resources to perform an is widely regarded as insecure, as the resources to perform an
exhaustive brute-force attack have been well within the realm of exhaustive brute-force attack have been well within the realm of
Line 71: Line 71:
===== SSH Protocols ===== ===== SSH Protocols =====
Two major versions of the SSH protocol are in widespread use. Two major versions of the SSH protocol are in widespread use.
-The SSH1 protocol is an older version of the SSH protocol that's still +The SSH-1 protocol is an older version of the SSH protocol that's still 
-widely supported despite its age and some technical issues. The SSH2+widely supported despite its age and some technical issues. The SSH-2
protocol has become the de-facto standard for most installations, protocol has become the de-facto standard for most installations,
-although there are still a few systems out there only supporting SSH1+although there are still a few systems out there only supporting SSH-1
-Additionally, many sites that use SSH2 now disable the SSH1 protocol+Additionally, many sites that use SSH-2 now disable the SSH-1 protocol
for security reasons. for security reasons.
-The default setting in WinSCP is to prefer SSH2 and negotiate +The default setting in WinSCP is to prefer SSH-2 and negotiate 
-down to SSH1 if SSH2 is not available. If the majority of systems you +down to SSH-1 if SSH-2 is not available. If the majority of systems you 
-connect to are using SSH2, you may wish to change this setting in the+connect to are using SSH-2, you may wish to change this setting in the
SSH preferences. SSH preferences.

Last modified: by martin