NAME¶
secsh - the Secure Shell protocol
DESCRIPTION¶
secsh is a protocol suite for secure remote login and other secure
network services over an insecure network. It is outlined in
[SECSH].
It has three major components:
- The Transport layer protocol
- This protocol, specified in [SECSH-TLP], provides
server authentication, confidentiality, and integrity with perfect forward
secrecy.
- The User authentication protocol
- This protocol, specified in [SECSH-AUTH], is used to
authenticate a client to a server.
- The Connection protocol
- This protocol, specified in [SECSH-CONN],
multiplexes an encrypted tunnel into several logical channels.
IMPLEMENTATIONS¶
Several implementations of the secsh protocol suite exist.
The
SSH2 product of SSH Communications Security Ltd., Finland
<
URL:http://www.ssh.fi> was the first. The secsh protocol suite has
benefited a lot from their experience with their older SSH1 product, which is
still in widespread use; it implements an older protocol (
[SSH1]).
The
lsh suite of programs is a free implementation of the secsh protocol
suite; it is distributed under the GNU General Public License.
REFERENCES¶
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S.
Lehtinen,
SSH Protocol Architecture, Internet draft, 6 August 1998
[SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S.
Lehtinen,
SSH Transport Layer Protocol, Internet draft, 6 August 1998
[SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S.
Lehtinen,
SSH Authentication Protocol, Internet draft, 6 August 1998
[SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen
SSH Connection Protocol, Internet draft, 6 August 1998
[SSH1] T. Ylonen,
The SSH (Secure Shell) Remote Login Protocol,
Internet draft (expired), 15 November 1995
TRADEMARKS¶
SSH and Secure Shell are trademarks or registered trademarks of SSH
Communications Security Ltd.
AUTHOR¶
This man-page was written by J.H.M. Dassen (Ray)
<jdassen@wi.LeidenUniv.nl>.
SEE ALSO¶
lsh(1),
lshd(8),
ssh2(1),
sshd2(8),
ssh1(1),
sshd1(8)