ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2006-12-23 2007-06-06
ui_login_ssh (martin) no summary (67.163.93.71)
Line 1: Line 1:
====== Understanding SSH ====== ====== Understanding SSH ======
-SSH is a cryptographically protected remote login protocol +SSH is a cryptographically protected remote login protocol that replaces insecure telnet and rlogin protocols. SSH·provides strong protection against password sniffing and third party·session monitoring, better protecting your authentication credentials
-designed to replace the insecure telnet and rlogin protocols. SSH +
-provides strong protection against password sniffing and third party +
-session monitoring, better protecting your authentication credentials+
and privacy. In addition to protecting your passwords and your privacy, and privacy. In addition to protecting your passwords and your privacy,
SSH offers additional authentication methods that are considered more SSH offers additional authentication methods that are considered more
Line 42: Line 39:
===== Encryption in SSH ===== ===== Encryption in SSH =====
-A number of encryption methods can be used by SSH clients and +SSH clients and servers can use a number of encryption methods. In the older SSH-1 protocol, 3DES and DES are typically used.
-servers. In the older SSH-1 protocol, 3DES and DES are typically used.+
SSH-2 adds support for additional encryption methods including AES and SSH-2 adds support for additional encryption methods including AES and
-Blowfish. By default, AES is used if supported by the server. AES is +Blowfish. By default, AES is used if supported by the server. While AES is 
-considered to be highly secure, however substantial processor overhead +considered to be highly secure, AES encryption requires substantial processor overhead. Blowfish is also considered
-is involved in performing AES encryption. Blowfish is also considered+
secure, but with less computational overhead, it's also theoretically secure, but with less computational overhead, it's also theoretically
easier to perform a brute-force attack. Depending on your security and easier to perform a brute-force attack. Depending on your security and
Line 58: Line 53:
===== SSH Protocols ===== ===== SSH Protocols =====
Two major versions of the SSH protocol are in widespread use. Two major versions of the SSH protocol are in widespread use.
-The SSH-1 protocol is an older version of the SSH protocol that's still+The SSH-1 protocol is an older version that's still
widely supported despite its age and some technical issues. The SSH-2 widely supported despite its age and some technical issues. The SSH-2
-protocol has become the de-facto standard for most installations, +protocol has become the de-facto installation standard, though some systems only support SSH-1. In addition, many sites that use SSH-2 disable the SSH-1 protocol
-although there are still a few systems out there only supporting SSH-1. +
-Additionally, many sites that use SSH-2 now disable the SSH-1 protocol+
for security reasons. for security reasons.
-The default setting in WinSCP is to prefer SSH-2 and negotiate+WinSCP's default setting is to prefer SSH-2 and negotiate
down to SSH-1 if SSH-2 is not available. If the majority of systems you down to SSH-1 if SSH-2 is not available. If the majority of systems you
connect to are using SSH-2, you may wish to change this setting in the connect to are using SSH-2, you may wish to change this setting in the
Line 76: Line 69:
slower transfers, particularly depending on the type of data being slower transfers, particularly depending on the type of data being
transferred - large text files may still benefit significantly, while transferred - large text files may still benefit significantly, while
-binaries may actually transfer more slowly. You may wish to+binaries may actually transfer more slowly. You may want to
experiment to find what works best in your situation. Compression may experiment to find what works best in your situation. Compression may
also improve security slightly, in part by rendering known-cyphertext also improve security slightly, in part by rendering known-cyphertext

Last modified: by 67.163.93.71