Secure Shell
Secure Shell
Secure Shell (SSH) is a secure application
program that can be used today for several
purposes such as remote logging and file
transfer
it was originally designed to replace TELNET
There are two versions of SSH: SSH-1 and
SSH-2, which are totally incompatible
The first version, SSH-1, is now deprecated
because of security flaws in it.
Components
1. SSH Transport-Layer Protocol
(SSH-TRANS)
SSH first uses a protocol that creates a secured
channel on top of the TCP. This new layer is an
independent protocol referred to as SSH-TRANS
When the procedure implementing this protocol
is called, the client and server first use the TCP
protocol to establish an insecure connection.
Then they exchange several security parameters
to establish a secure channel on top of the TCP
services provided by SSH-TRANS
1. Privacy or confidentiality of the message exchanged
2. Data integrity, which means that it is guaranteed that
the messages exchanged between the client and
server are not changed by an intruder
3. Server authentication, which means that the client is
now sure that the server is the one that it claims to be
4. Compression of the messages, which improves the efficiency of
the system andmakes attack more difficult
SSH Authentication Protocol (SSH-
AUTH)
Now, SSH can call another procedure that can
authenticate the client for the server
Authentication starts with the client, which sends a
request message to the server. The request includes the
user name, server name, the method of authentication,
and the required data.
The server responds with either a success message,
which confirms that the client is authenticated, or a failed
message, which means that the process needs to be
repeated with a new request message.
SSH Connection Protocol (SSH-
CONN)
One of the services provided by the SSH-CONN
protocol is multiplexing.
SSH-CONN takes the secure channel established
by the two previous protocols and lets the client
create multiple logical channels over it.
Each channel can be used for a different purpose,
such as remote logging, file transfer, and so on.
Applications
SSH for Remote Loggin
Eg- PuTTy
SSH for File Transfer – Secure File Transfer
Program (sftp) –
The sftp application program uses
one of the channels provided by the SSH to
transfer files
Port Forwarding - The SSH port forwarding
mechanism creates a tunnel through which the
messages belonging to other protocols can
travel
Format of the SSH Packets