Introduction to SSH
Secure Shell is a combination of client and server software that transparently encrypts and decrypts data flow between hosts on a network. SSH provides a suite of secure network commands that you can use in addition to, or in place of, traditional nonsecure network commands like TELNET and FTP. Using Secure Shell commands, you create a secure connection between systems running the Secure Shell client and server software by providing the following security methods:
A Secure Shell server (SSH server) is a system on which the system manager installs and runs the Secure Shell server software. The SSH server accepts and rejects incoming connections to the server from the SSH clients on remote hosts. The SSH server listens on the port defined for the TCP/IP SSH service (port 22 by default). When a connection request occurs, the auxiliary server creates a new server process that controls all data exchanges over the new connection. The SSH server provides the following functions:
For all of these functions, the entire login and data transfer sessions, including user identification information, are secured through user authentication and data encryption. A Secure Shell client (SSH client) is a system on which the system manager installs the Secure Shell client software. SSH commands invoke the following SSH utilities:
These commands and utilities are described in Chapter 7.
|