SlideShare a Scribd company logo
1 of 29
P
D
N
T
S
P
A
By
B. Sai Anirudh
1005-11-735027
 Introduction
 History
 Functions
 Architecture
 Protect against
 Disadvantages
 Conclusion
 References
 a network protocol
 allows secure communication between two
computers
 Shell-a command line interface present on
every computer, used to log into a remote
machine and execute commands
 Encryption provides confidentiality and integrity
of data
 uses public-key cryptography
 Tatu Ylonen designed the first version of the
protocol (SSH-1) in 1995
 Goal of SSH is to replace the earlier rlogin,
TELNET and rsh
 It was made as open source later and gained
popularity
 In 1996 SSH-2 was designed which is
incompatible with previous version
 SSH-2 featured both security and feature
improvements over SSH-1
Better security through Diffie-Hellman key
exchange
Strong integrity checking via message
authentication codes
 Bjorn Gronvall's OSSH developed from this codebase
 “Portability" branch was formed to port OpenSSH to other operating
systems
 As of 2005
 OpenSSH is the single most popular ssh implementation
 The default in a large number of operating systems.
 OSSH meanwhile has become obsolete
 In 2006, SSH-2 protocol became a proposed Internet standard
1) Secure Command Shell
2) Port Forwarding
3) Secure file transfer.
 Allow you to edit files.
 View the contents of directories.
 Custom based applications.
 Create user accounts.
 Change permissions.
 Anything can be done from command
prompt can be done remotely and securely.
 provide security to TCP/IP applications
including e-mail, sales and customer contact
databases, and in-house applications.
 allows data from normally unsecured TCP/IP
applications to be secured.
 A subsystem of the Secure Shell protocol.
 to handle file transfers.
 encrypts both the username/password and
the data being transferred.
 Uses the same port as the Secure Shell
server, eliminating the need to open another
port on the firewall or router.
 The SSH-2 protocol has a clean internal
architecture with well-separated layers:
 Transport Layer
 User Authentication Layer
 Connection Layer
 Defined in “RFC 4251”
 Handles initial key exchange and server authentication
 sets up encryption, compression and integrity
verification.
 It exposes to the upper layer an interface for sending
and receiving plaintext packets of up to 32kb
 also arranges for key re-exchange
 It handles client authentication
 Provides a number of authentication methods.
 Authentication is client-driven
 Password
 Public key
 Keyboard-interactive
 GSSAPI authentication
 A method for straightforward password
authentication
 Includes a facility allowing a password to be
changed
 A method for public key-based authentication
 Symmetric key (secret)
 Asymmetric key (public and private)
 The server sends one or more prompts to enter
information
 The client displays them and sends back responses
keyed-in by the user
 Used to provide one-time password authentication
such as S/Key or SecurID.
 Used by some OpenSSH configurations when PAM is
the underlying host authentication provider to
effectively provide password authentication
 Stands for Generic Security Services
Application Program Interface.
 the exchange of opaque messages (tokens)
which hide the implementation detail from the
higher-level application.
 Defines the concept of channels, channel requests and
global requests using which SSH services are provided.
 A single SSH connection can host multiple channels
simultaneously, in duplex mode
 Channel requests are used to relay out-of-band channel
specific data, such as the changed size of a terminal
window or the exit code of a server-side process.
 The SSH client requests a server-side port to be forwarded
using a global request.
 IPS Spoofing
 DNS Spoofing
 IP Source Routing
 Dynamic ports cannot be forwarded.
 Sometimes port forwarding also introduces
security problems.
 A client on the internet that uses SSH to access
the intranet, can expose the intranet by port
forwarding.
 As compared to the other link, network, and application
security measures like IPsec, n PGP, Secure Shell is
relatively secure, reliable, quick and easy.
 By deploying Secure Shell, companies create a
comprehensive general-purpose tunneling platform that
can be used to implement a wide variety of security
policies, ensuring the privacy, authenticity, authorization
and integrity of many different applications.
 [1] Cusack, F. and Forssen, M. "Generic Message Exchange
Authentication for the Secure Shell Protocol (SSH)," RFC 4256,
January 2006.
 [2] Lehtinen, S. and Lonvick, C., "The Secure Shell (SSH) Protocol
Assigned Numbers," RFC 4250, January 2006.
 [3] JSchlyter, J. and Griffin, W. "Using DNS to Securely Publish Secure
Shell (SSH) Key Fingerprints," RFC 4255, January 2006.
 [4] Ylonen, T., "SSH – Secure Login Connections over the Internet,"
Proceedings, Sixth USENIX UNIX Security Symposium, July 1996.
Secure shell protocol

More Related Content

What's hot (20)

Secure Shell(ssh)
Secure Shell(ssh)Secure Shell(ssh)
Secure Shell(ssh)
 
Ipsec
IpsecIpsec
Ipsec
 
Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Hash function
Hash functionHash function
Hash function
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Credential store using HashiCorp Vault
Credential store using HashiCorp VaultCredential store using HashiCorp Vault
Credential store using HashiCorp Vault
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Pgp
PgpPgp
Pgp
 
Ike
IkeIke
Ike
 
Diffie Hellman Key Exchange
Diffie Hellman Key ExchangeDiffie Hellman Key Exchange
Diffie Hellman Key Exchange
 
2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinux2008-10-15 Red Hat Deep Dive Sessions: SELinux
2008-10-15 Red Hat Deep Dive Sessions: SELinux
 
Windows Security Crash Course
Windows Security Crash CourseWindows Security Crash Course
Windows Security Crash Course
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
12 symmetric key cryptography
12   symmetric key cryptography12   symmetric key cryptography
12 symmetric key cryptography
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Ssh tunnel
Ssh tunnelSsh tunnel
Ssh tunnel
 

Viewers also liked

Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...Thoughtworks
 
Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHPjikbal
 
Sed & awk the dynamic duo
Sed & awk   the dynamic duoSed & awk   the dynamic duo
Sed & awk the dynamic duoJoshua Thijssen
 
Unix command-line tools
Unix command-line toolsUnix command-line tools
Unix command-line toolsEric Wilson
 
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure  V1.0Defeating The Network Security Infrastructure  V1.0
Defeating The Network Security Infrastructure V1.0Philippe Bogaerts
 
Practical unix utilities for text processing
Practical unix utilities for text processingPractical unix utilities for text processing
Practical unix utilities for text processingAnton Arhipov
 
Practical Example of grep command in unix
Practical Example of grep command in unixPractical Example of grep command in unix
Practical Example of grep command in unixJavin Paul
 
Learning sed and awk
Learning sed and awkLearning sed and awk
Learning sed and awkYogesh Sawant
 
Unix Command Line Productivity Tips
Unix Command Line Productivity TipsUnix Command Line Productivity Tips
Unix Command Line Productivity TipsKeith Bennett
 
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPVirtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPMichael Coates
 
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014iimjobs and hirist
 
RHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRadien software
 
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsLinux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsBrendan Gregg
 
Linux Systems Performance 2016
Linux Systems Performance 2016Linux Systems Performance 2016
Linux Systems Performance 2016Brendan Gregg
 
Broken Linux Performance Tools 2016
Broken Linux Performance Tools 2016Broken Linux Performance Tools 2016
Broken Linux Performance Tools 2016Brendan Gregg
 

Viewers also liked (19)

Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...Web Application Security: Introduction to common classes of security flaws an...
Web Application Security: Introduction to common classes of security flaws an...
 
Web Application Security with PHP
Web Application Security with PHPWeb Application Security with PHP
Web Application Security with PHP
 
Sed & awk the dynamic duo
Sed & awk   the dynamic duoSed & awk   the dynamic duo
Sed & awk the dynamic duo
 
Unix command-line tools
Unix command-line toolsUnix command-line tools
Unix command-line tools
 
Secure SHell
Secure SHellSecure SHell
Secure SHell
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
PHP Secure Programming
PHP Secure ProgrammingPHP Secure Programming
PHP Secure Programming
 
Defeating The Network Security Infrastructure V1.0
Defeating The Network Security Infrastructure  V1.0Defeating The Network Security Infrastructure  V1.0
Defeating The Network Security Infrastructure V1.0
 
Practical unix utilities for text processing
Practical unix utilities for text processingPractical unix utilities for text processing
Practical unix utilities for text processing
 
Practical Example of grep command in unix
Practical Example of grep command in unixPractical Example of grep command in unix
Practical Example of grep command in unix
 
How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF How to Setup A Pen test Lab and How to Play CTF
How to Setup A Pen test Lab and How to Play CTF
 
Learning sed and awk
Learning sed and awkLearning sed and awk
Learning sed and awk
 
Unix Command Line Productivity Tips
Unix Command Line Productivity TipsUnix Command Line Productivity Tips
Unix Command Line Productivity Tips
 
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAPVirtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
Virtual Security Lab Setup - OWASP Broken Web Apps, Webgoat, & ZAP
 
Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014Top 100 Linux Interview Questions and Answers 2014
Top 100 Linux Interview Questions and Answers 2014
 
RHCE FINAL Questions and Answers
RHCE FINAL Questions and AnswersRHCE FINAL Questions and Answers
RHCE FINAL Questions and Answers
 
Linux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old SecretsLinux Performance Analysis: New Tools and Old Secrets
Linux Performance Analysis: New Tools and Old Secrets
 
Linux Systems Performance 2016
Linux Systems Performance 2016Linux Systems Performance 2016
Linux Systems Performance 2016
 
Broken Linux Performance Tools 2016
Broken Linux Performance Tools 2016Broken Linux Performance Tools 2016
Broken Linux Performance Tools 2016
 

Similar to Secure shell protocol

Ssh
SshSsh
Sshgh02
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.pptImXaib
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionCSCJournals
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure ShellWILLA REYES
 
Ports and services
Ports and servicesPorts and services
Ports and servicesIlan Mindel
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And RloginSourav Roy
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbChanaka Lasantha
 
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safeOpenSSH: keep your secrets safe
OpenSSH: keep your secrets safeGiovanni Bechis
 

Similar to Secure shell protocol (20)

Ssh
SshSsh
Ssh
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Windowshadoop
WindowshadoopWindowshadoop
Windowshadoop
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
Meeting 5.2 : ssh
Meeting 5.2 : sshMeeting 5.2 : ssh
Meeting 5.2 : ssh
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
SSh_part_1.pptx
SSh_part_1.pptxSSh_part_1.pptx
SSh_part_1.pptx
 
Telnet & Secure Shell
Telnet & Secure ShellTelnet & Secure Shell
Telnet & Secure Shell
 
Remote1
Remote1Remote1
Remote1
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Ssh And Rlogin
Ssh And RloginSsh And Rlogin
Ssh And Rlogin
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Site to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql dbSite to-multi site open vpn solution with mysql db
Site to-multi site open vpn solution with mysql db
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
OpenSSH: keep your secrets safe
OpenSSH: keep your secrets safeOpenSSH: keep your secrets safe
OpenSSH: keep your secrets safe
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Secure shell protocol

  • 3.  Introduction  History  Functions  Architecture  Protect against  Disadvantages  Conclusion  References
  • 4.  a network protocol  allows secure communication between two computers  Shell-a command line interface present on every computer, used to log into a remote machine and execute commands
  • 5.  Encryption provides confidentiality and integrity of data  uses public-key cryptography
  • 6.  Tatu Ylonen designed the first version of the protocol (SSH-1) in 1995  Goal of SSH is to replace the earlier rlogin, TELNET and rsh  It was made as open source later and gained popularity
  • 7.  In 1996 SSH-2 was designed which is incompatible with previous version  SSH-2 featured both security and feature improvements over SSH-1 Better security through Diffie-Hellman key exchange Strong integrity checking via message authentication codes
  • 8.  Bjorn Gronvall's OSSH developed from this codebase  “Portability" branch was formed to port OpenSSH to other operating systems  As of 2005  OpenSSH is the single most popular ssh implementation  The default in a large number of operating systems.  OSSH meanwhile has become obsolete  In 2006, SSH-2 protocol became a proposed Internet standard
  • 9. 1) Secure Command Shell 2) Port Forwarding 3) Secure file transfer.
  • 10.  Allow you to edit files.  View the contents of directories.  Custom based applications.  Create user accounts.  Change permissions.  Anything can be done from command prompt can be done remotely and securely.
  • 11.  provide security to TCP/IP applications including e-mail, sales and customer contact databases, and in-house applications.  allows data from normally unsecured TCP/IP applications to be secured.
  • 12.
  • 13.  A subsystem of the Secure Shell protocol.  to handle file transfers.  encrypts both the username/password and the data being transferred.  Uses the same port as the Secure Shell server, eliminating the need to open another port on the firewall or router.
  • 14.
  • 15.  The SSH-2 protocol has a clean internal architecture with well-separated layers:  Transport Layer  User Authentication Layer  Connection Layer  Defined in “RFC 4251”
  • 16.  Handles initial key exchange and server authentication  sets up encryption, compression and integrity verification.  It exposes to the upper layer an interface for sending and receiving plaintext packets of up to 32kb  also arranges for key re-exchange
  • 17.  It handles client authentication  Provides a number of authentication methods.  Authentication is client-driven
  • 18.  Password  Public key  Keyboard-interactive  GSSAPI authentication
  • 19.  A method for straightforward password authentication  Includes a facility allowing a password to be changed
  • 20.  A method for public key-based authentication  Symmetric key (secret)  Asymmetric key (public and private)
  • 21.
  • 22.  The server sends one or more prompts to enter information  The client displays them and sends back responses keyed-in by the user  Used to provide one-time password authentication such as S/Key or SecurID.  Used by some OpenSSH configurations when PAM is the underlying host authentication provider to effectively provide password authentication
  • 23.  Stands for Generic Security Services Application Program Interface.  the exchange of opaque messages (tokens) which hide the implementation detail from the higher-level application.
  • 24.  Defines the concept of channels, channel requests and global requests using which SSH services are provided.  A single SSH connection can host multiple channels simultaneously, in duplex mode  Channel requests are used to relay out-of-band channel specific data, such as the changed size of a terminal window or the exit code of a server-side process.  The SSH client requests a server-side port to be forwarded using a global request.
  • 25.  IPS Spoofing  DNS Spoofing  IP Source Routing
  • 26.  Dynamic ports cannot be forwarded.  Sometimes port forwarding also introduces security problems.  A client on the internet that uses SSH to access the intranet, can expose the intranet by port forwarding.
  • 27.  As compared to the other link, network, and application security measures like IPsec, n PGP, Secure Shell is relatively secure, reliable, quick and easy.  By deploying Secure Shell, companies create a comprehensive general-purpose tunneling platform that can be used to implement a wide variety of security policies, ensuring the privacy, authenticity, authorization and integrity of many different applications.
  • 28.  [1] Cusack, F. and Forssen, M. "Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)," RFC 4256, January 2006.  [2] Lehtinen, S. and Lonvick, C., "The Secure Shell (SSH) Protocol Assigned Numbers," RFC 4250, January 2006.  [3] JSchlyter, J. and Griffin, W. "Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints," RFC 4255, January 2006.  [4] Ylonen, T., "SSH – Secure Login Connections over the Internet," Proceedings, Sixth USENIX UNIX Security Symposium, July 1996.

Editor's Notes

  1. 1995: Tatu Ylonen designed the first version of the protocol (SSH-1) Prompted by a password-sniffing attack at his university’s network Goal of SSH as to replace the earlier rlogin, TELNET and rsh protocols Did not provide strong authentication or guarantee confidentiality Ylonen released his implementation as freeware in July 1995 Tool quickly gained in popularity
  2. Separate protocol layered over the Secure Shell protocol to handle file transfers.
  3. The transport layer (RFC 4253)
  4. The user authentication layer (RFC 4252)
  5. each transferring data in both directions.