Académique Documents
Professionnel Documents
Culture Documents
June 2014
The Internet makes it possible to carry out a wide variety of remote operations, and particularly
server administration and file transfers. The Telnet protocol and the BSD r-commands (rsh, rlogin
and rexec) that let users perform these remote tasks have the major disadvantage of circulating
exchanged information in plaintext on the network, and particularly the login and password to
access the remote machine. As such, a hacker who is located on a network between the user
and the remote machine can monitor traffic, that is, use a tool called a sniffer that can capture
packets circulating on the network and obtain the login and password to access the remote
machine.
Even if the exchanged information does not have a high security level, the hacker obtains access
to an account on the remote machine and can possibly escalate his privileges on the machine to
obtain root access.
Given that it is impossiblie to control all physical infrastructures located between the user and the
remote machine (the Internet being an open network by definition), the only solution is to rely on
security at the logical level (at the data level).
The SSH (Secure Shell) protocol is a response to this problem in that it enables users (or TCP/IP
services) to access a machine via an encrypted communication (called a tunnel).
SSH is a protocol, that is, a standard method enabling machines to establish a secure
connection. As such, there are a variety of SSH client and server implementations. Some require
a fee, while others are free or open source: you will find a certain number of SSH clients in the
downloading section of CommentCaMarche.
Authentication
Once the secure connection is established between the client and the server, the client has to log
on to the server to obtain an access right. There are several methods:
the most well-known method is the traditional password. The client sends a login and a
password to the server via the secure connection and the server checks whether the user in
question has access to the machine and whether the password provided is valid.
a lesser known but more flexible method is the use of public keys. If the client chooses key
authentication, the server will create a challenge and give access to the client if the latter is
able to decrypt the challenge with its private key
Criptografa - Caparazn Seguro (protocolo SSH) Kryptographie - Secure Shell (Protokoll SSH)
Cryptographie - Secure Shell (protocole SSH) Crittografia - Secure Shell (protocollo SSH)
Codificao por substituio
This document entitled Cryptography - Secure Shell (SSH protocol) from Kioskea (en.kioskea.net) is made
available under the Creative Commons license. You can copy, modify copies of this page, under the conditions
stipulated by the license, as this note appears clearly.