O'Reilly logo

The Illustrated Network, 2nd Edition by Walter Goralski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 30

Secure Shell (Remote Access)

Abstract

In this chapter, you will learn how the secure shell (SSH) is used as a more secure method of remote access than Telnet. We’ll talk about the SSH model, features, and architectures.

You will learn how the SSH protocols operate and how keys are distributed. We’ll do a simple example of Diffie-Hellman key distribution using only a pocket calculator and no advanced mathematics.

Keywords

SSH; TCP/IP tool; PRNG; SSH-TRANS; SSH-CONN; SFTP

What You Will Learn

In this chapter, you will learn how the secure shell (SSH) is used as a more secure method of remote access than Telnet. We’ll talk about the SSH model, features, and architectures.

You will learn how the SSH protocols operate and how keys are distributed. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required