The Secret Security Wiki

Categories
Categories

Secure Socket Shell

Secure Shell (SSH) is a cryptographic protocol that provides communications security over a computer network, connecting an SSH client application with an SSH server. It is typically used to access shell accounts on remote servers. Shell accounts are typically available on Linux systems (but not only) and provide a user interface to the operating system’s services for the purpose of system management.

  • What is SSH?

    Secure Socket Shell is a secure protocol that connects a client to an administrative account (i.e. shell account) on a server system typically for the purpose of carrying out system management tasks.

  • How is SSH different from Telnet?

    SSH is a secure version of Telnet that uses cryptography to secure the communications channel and authenticate users and devices.

  • What is an SSH key?

    SSH key typically refers to the private key used to authenticate the SSH client instead of a password – also referred to as passwordless SSH.

  • How to set up SSH keys?

    SSH uses public-key cryptography to authenticate the remote computer and the client. In public key cryptography, a pair of asymmetric cryptographic keys are generated – a private key and a public key. The private key is accessible solely to its owner and used to authenticate its owner. The corresponding public key is given to any entity that wants to authenticate the owner of the private key.

  • What is public key SSH?

    SSH uses public-key cryptography to authenticate the remote computer and the client. In public key cryptography, a pair of asymmetric cryptographic keys are generated – a private key and a public key. The private key is accessible solely to its owner and used to authenticate its owner. The corresponding public key is given to any entity that wants to authenticate the owner of the private key.

  • Is SSH TCP?

    SSH supports communications over TCP/IP. Transmission Control Protocol (TCP) is the protocol that provides reliable, ordered, and error-checked delivery of data packets between applications running on hosts communicating via an IP network.

  • Which encryption algorithm is used by SSH?

    SSH supports a host of asymmetric and symmetric encryption algorithms, including RSA, ECDSA, AES, 3DES, and more https://www.openssh.com/features.html

  • Does SSH use TLS?

    SSH does not need to use TLS, it has its own transport protocol completely independent from SSL,. To compare the both from a security perspective both are equally secured.

  • What is the difference between Telnet and SSH?

    Secure Socket Shell is a protocol used to access remote resources and manage devices. The main difference between SSH and Telnet is that SSH uses encryption to prevent Man in the middle attacks.