Public Key Standards: Secure Shell
Xukai Zou, Purdue University School of Science at Indianapolis
SSH Introduction and Its History
Conventional Ways of Remote Access and Problems
What Is the Secure Shell?
History of SSH
SSH Functionality and Services
Services
Functionality
SSH Data Types, Message Formats and Algorithm Naming
Data Types and Their Representation
Message Numbers
Algorithm Naming
SSH Protocol Architecture
The Transport Layer Protocol (SSH-TRANS)
User Authentication Protocol (SSH-USERAUTH)
The Connection Protocol (SSH-CONNECT)
Connection, (Interactive) Sessions, and Channels
Secure File Transfer Protocol
Function and Position
General Packet Format
Protocol Initialization
File Attributes
Requests From the Client to the Server
Request Synchronization and Reordering
File Names
File Operations
Secure Tunneling: TCP Port Forwarding and X Forwarding
TCP/IP Port Forwarding
X Forwarding
SSH Key Management
SSH Public Key File Format and Public Key Subsystem
Security
Comparison of SSH1 and SSH2
The Man-in-the-Middle Attacks
Denial of Service Attacks
SSH in the Real World
Operating Systems Support for SSH
Current Implementations
Installation and Execution
Conclusion
Acknowledgment
Glossary
Cross References
References
SSH INTRODUCTION AND ITS HISTORY
The advent of the Internet and its rapid spread around the world have changed the way we look at communication. It is no longer restricted to telephones, couriers, or fax. Instead, in the present age of digital revolution, it is almost ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.