Public Key Standards: Secure Shell

Xukai Zou, Purdue University School of Science at Indianapolis

SSH Introduction and Its History

Conventional Ways of Remote Access and Problems

What Is the Secure Shell?

History of SSH

SSH Functionality and Services

Services

Functionality

SSH Data Types, Message Formats and Algorithm Naming

Data Types and Their Representation

Message Numbers

Algorithm Naming

SSH Protocol Architecture

The Transport Layer Protocol (SSH-TRANS)

User Authentication Protocol (SSH-USERAUTH)

The Connection Protocol (SSH-CONNECT)

Connection, (Interactive) Sessions, and Channels

Secure File Transfer Protocol

Function and Position

General Packet Format

Protocol Initialization

File Attributes

Requests From the Client to the Server

Request Synchronization and Reordering

File Names

File Operations

Secure Tunneling: TCP Port Forwarding and X Forwarding

TCP/IP Port Forwarding

X Forwarding

SSH Key Management

SSH Public Key File Format and Public Key Subsystem

Security

Comparison of SSH1 and SSH2

The Man-in-the-Middle Attacks

Denial of Service Attacks

SSH in the Real World

Operating Systems Support for SSH

Current Implementations

Installation and Execution

Conclusion

Acknowledgment

Glossary

Cross References

References

SSH INTRODUCTION AND ITS HISTORY

The advent of the Internet and its rapid spread around the world have changed the way we look at communication. It is no longer restricted to telephones, couriers, or fax. Instead, in the present age of digital revolution, it is almost ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.