Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). The protocol specification distinguishes two major versions that are referred to as SSH-1 and SSH-2.
The best-known application of the protocol is for access to shell accounts on Unix-like operating systems (it can be used in a similar fashion for accounts on Windows, though that is not a very popular option due to Remote Desktop Services). It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.
Internet protocols |
---|
Application layer |
|
Transport layer |
|
Routing protocols * |
|
Internet layer |
|
Link layer |
|
* Not a layer. A routing protocol belongs either to application or network layer. |
Read more about Secure Shell: Definition, Key Management, Usage, Internet Standard Documentation, Uses, Architecture, Enhancements
Famous quotes containing the words secure and/or shell:
“The Declaration [of Independence] was not a protest against government, but against the excess of government. It prescribed the proper role of government, to secure the rights of individuals and to effect their safety and happiness. In modern society, no individual can do this alone. So government is not a necessary evil but a necessary good.”
—Gerald R. Ford (b. 1913)
“There are no small number of people in this world who, solitary by nature,
always try to go back into their shell like a hermit crab or a snail.”
—Anton Pavlovich Chekhov (18601904)