Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Secure Shell (SSH) Protocol: A Secure Replacement for Telnet, Summaries of Network security

An introduction to the secure shell (ssh) protocol, a client-server system that enables secure connections between two computers over a tcp network. Ssh was designed as a secure replacement for the older and insecure telnet protocol. The basics of ssh, its history, and the preliminaries required to set up an ssh connection. It also explains how to install and enable ssh on macos and linux systems.

What you will learn

  • How does SSH differ from Telnet?
  • What are the preliminaries required to set up an SSH connection?
  • What is the Secure Shell (SSH) protocol?

Typology: Summaries

2021/2022

Uploaded on 09/27/2022

damyen
damyen 🇺🇸

4.4

(27)

274 documents

1 / 3

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
INTRODUCING SSH
The SSH protocol allows one computer running an SSH client to securely connect
to another running an SSH server. In other words, SSH is a client-server protocol.
The computer initiating the connection is referred to as the client, and the computer
being connected to as the server.
SSH operates over TCP, and while SSH servers can listen on any TCP port, by
default SSH servers listen on port 22. As its name suggests, security is integral to
the Secure Shell, and all SSH traffic is encrypted by default.
SSH is often described as the secure replacement for the older insecure Telnet
protocol. It’s certainly true that SSH provides a secure replacement for Telnet, but
it’s much more than that, providing additional features Telnet never did.
The first version of SSH dates back to 1995, which sounds old in IT terms, but
bear in mind that Telnet dates back to 1968! The first version of the SSH protocol
had some security shortcomings, so a new version of the protocol, SSH 2, was
released in 2006, and this is what we use today.
Some Preliminaries
To play along with this segment you’ll need two computers with SSH installed the
SSH service enabled on at least one of those computers, and TCP/IP network
connectivity between them.
pf3

Partial preview of the text

Download Understanding Secure Shell (SSH) Protocol: A Secure Replacement for Telnet and more Summaries Network security in PDF only on Docsity!

INTRODUCING SSH

The SSH protocol allows one computer running an SSH client to securely connect to another running an SSH server. In other words, SSH is a client-server protocol. The computer initiating the connection is referred to as the client, and the computer being connected to as the server. SSH operates over TCP, and while SSH servers can listen on any TCP port, by default SSH servers listen on port 22. As its name suggests, security is integral to the Secure Shell, and all SSH traffic is encrypted by default. SSH is often described as the secure replacement for the older insecure Telnet protocol. It’s certainly true that SSH provides a secure replacement for Telnet, but it’s much more than that, providing additional features Telnet never did. The first version of SSH dates back to 1995, which sounds old in IT terms, but bear in mind that Telnet dates back to 1968! The first version of the SSH protocol had some security shortcomings, so a new version of the protocol, SSH 2, was released in 2006, and this is what we use today.

Some Preliminaries

To play along with this segment you’ll need two computers with SSH installed the SSH service enabled on at least one of those computers, and TCP/IP network connectivity between them.

The two computers can be a mix of OS X, Linux, and Unix. OS X comes with SSH installed by default, but remote logins over SSH are disabled by default, i.e. the SSH service is not running by default. This means that a Mac can always act as an SSH client, but can only act as an SSH server it has been configured to do so. To enable the SSH service on a Mac, open the Sharing preference pane and enable the ‘Remote Login’ option. This interface will allow you to limit SSH access to just some of the user accounts on your Mac, or to allow all users connect to your Mac over SSH.

Linux machines usually have SSH installed and enabled by default. Instructions for installation and activation vary from one Linux distribution to the next, so I’ll have to leave it as an exercise for the reader to find instructions for specific Linux distros as needed.