About the Secure Shell Protocol
Secure Shell (SSH-2) is a TCP-based client/server protocol that provides the staples of secure networking:
- Authentication—Confirms the identity of both the server and the client user before initiating a Secure Shell session.
- Encryption—Encrypts information transferred over the network. Only the intended recipient can decrypt the information to view it.
- Data integrity—Ensures that the data that is sent is the same when it arrives at its destination.
A Secure Shell session, or tunnel, is an authenticated and encrypted SSH-2 connection initiated from a Secure Shell client to a host on the network that is running a Secure Shell server.
During the initial negotiation of this connection, both the server and client are authenticated. Server authentication is performed initially using public key exchange, and a number of authentication methods are supported for client authentication.
Note: |
In spite of this authentication, there remains the risk of a man-in-the-middle attack during the initial connection. |
Once the tunnel is established, the information channelled through it is encrypted using any of a number of supported encryption ciphers including Blowfish, 3DES, CAST128, and the U.S. Advanced Encryption Standard (AES). To protect the integrity of the data, SSH-2 supports Hash Message Authentication Code (HMAC) algorithms.