Computer Networks Protocols Lec.7 Dr. LAYTH ABDULKAREEM HASsnawi
14
Secure Shell Protocol (SSH)
The Secure Shell (SSH) protocol is a method for secure remote login from one computer to
another.
It protects the communications with strong encryption.
SSH, like TELNET, uses TCP as the underlying transport protocol, but SSH is more secure and
provides more services than TELNET. These services are:
1. Covers authentication, encryption.
2. Solve the security issues at remote login of Telnet.
3. Solve the security issues during file transfer at FTP
There are two versions of SSH: SSH-1 and SSH-2, which are totally incompatible.
The first version, SSH-1 is now deprecated because of security problems in it.
SSH is a proposed application-layer protocol with four components.
Q/ Compare between SSL and SSH?
is TCP-based and always used in WEB
applications, with HTTP.
is TCP-based and always used with Telnet and
FTP
SSH-2 Components
SSH is organized as three protocols (components) that typically run on top of TCP, these are:
SSH Transport-Layer Protocol (SSH-TRANS)
This protocol is responsible about:
Privacy or confidentiality of the message exchanged.
Data integrity.
Server authentication.
Compression of the messages that improve the efficiency of the system and make attack more
difficult.
SSH Authentication Protocol (SSH-AUTH)
After a secure channel is established between the client and the server, the server is
authenticated for the client, SSH can call software that can authenticate the client for the
server.