Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). The protocol specification distinguishes two major versions that are referred to as SSH-1 and SSH-2.
The best-known application of the protocol is for access to shell accounts on Unix-like operating systems (it can be used in a similar fashion for accounts on Windows, though that is not a very popular option due to Remote Desktop Services). It was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet.
Internet protocols |
---|
Application layer |
|
Transport layer |
|
Routing protocols * |
|
Internet layer |
|
Link layer |
|
* Not a layer. A routing protocol belongs either to application or network layer. |
Read more about Secure Shell: Definition, Key Management, Usage, Internet Standard Documentation, Uses, Architecture, Enhancements
Famous quotes containing the words secure and/or shell:
“... is it not clear that to give to such women as desire it and can devote themselves to literary and scientific pursuits all the advantages enjoyed by men of the same class will lessen essentially the number of thoughtless, idle, vain and frivolous women and thus secure the [sic] society the services of those who now hang as dead weight?”
—Sarah M. Grimke (17921873)
“Billy: You dropped some shell in there.
Ted: Its all right. Makes it crunchier that way. You like French toast crunchy, dont you?”
—Robert Benton (b. 1932)