Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). The protocol specification distinguishes two major versions that are referred to as SSH-1 and SSH-2.

The best-known application of the protocol is for access to shell accounts on Unix-like operating systems (it can be used in a similar fashion for accounts on Windows, though that is not a very popular option due to Remote Desktop Services). It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.

Internet protocols
Application layer
  • DHCP
  • DHCPv6
  • DNS
  • FTP
  • HTTP
  • IMAP
  • IRC
  • LDAP
  • MGCP
  • NNTP
  • NTP
  • POP
  • RPC
  • RTP
  • RTSP
  • SIP
  • SMTP
  • SNMP
  • SOCKS
  • SSH
  • Telnet
  • TLS/SSL
  • XMPP
  • (more)
Transport layer
  • TCP
  • UDP
  • DCCP
  • SCTP
  • RSVP
  • (more)
Routing protocols *
  • BGP
  • OSPF
  • RIP
  • (more)
Internet layer
  • IP
    • IPv4
    • IPv6
  • ICMP
  • ICMPv6
  • ECN
  • IGMP
  • IPsec
  • (more)
Link layer
  • ARP/InARP
  • NDP
  • Tunnels
    • L2TP
  • PPP
  • Media access control
    • Ethernet
    • DSL
    • ISDN
    • FDDI
  • (more)
* Not a layer. A routing protocol belongs either to application or network layer.

Read more about Secure ShellDefinition, Key Management, Usage, Internet Standard Documentation, Uses, Architecture, Enhancements

Other articles related to "secure shell":

ESSH Client
... It also has a tabbed Secure Shell window with named sessions ... profile management, host key management, different screen emulations for secure shell, and an easy to use GUI ... it allows docking of a secure shell window to the editor for ease of use ...
OpenSSH - Trademark
... the company would be asserting its ownership of the "SSH" and "Secure Shell" trademarks ... cost your company a lot more than a trademark." At the time, "SSH," "Secure Shell" and "ssh" had appeared in documents proposing the protocol as an open standard and it ... The participants argued that both "Secure Shell" and "SSH" were generic terms and could not be trademarks ...

Famous quotes containing the words shell and/or secure:

    We want some coat woven of elastic steel, stout as the first, and limber as the second. We want a ship in these billows we inhabit. An angular, dogmatic house would be rent to chips and splinters, in this storm of many elements. No, it must be tight, and fit to the form of man, to live at all; as a shell is the architecture of a house founded on the sea.
    Ralph Waldo Emerson (1803–1882)

    The prosecution of [Warren] Hastings, though he should escape at last, must have good effect. It will alarm the servants of the Company in India, that they may not always plunder with impunity, but that there may be a retrospect; and it will show them that even bribes of diamonds to the Crown may not secure them from prosecution.
    Horace Walpole (1717–1797)