Chapter 4. Solutions in this chapter:

  • Introduction to SSH
  • SSH Standards
  • SSH vs. Telnet/Rlogin
  • SSH Client/Server overview
  • Packet Capture Detection
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction to SSH

The SSH (Secure SHell) protocol was designed as a secure alternative to Telnet and Rlogin. Telnet and Rlogin send all data in a clear text format over the network, allowing packet capture programs like Sniffer™ and Wireshark™ to read the interactive session and display the session in clear text. SSH uses encryption to protect the session from view if captured. Encryption is a process that converts clear text into cipher text through an algorithm (such as 3DES, AES, etc.). The client and the server have to agree on the algorithm ...

Get Next Generation SSH2 Implementation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.