O'Reilly logo

Next Generation SSH2 Implementation by Dale Liu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Solutions in this chapter:

  • Introduction to SSH
  • SSH Standards
  • SSH vs. Telnet/Rlogin
  • SSH Client/Server overview
  • Packet Capture Detection
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions

Introduction to SSH

The SSH (Secure SHell) protocol was designed as a secure alternative to Telnet and Rlogin. Telnet and Rlogin send all data in a clear text format over the network, allowing packet capture programs like Sniffer™ and Wireshark™ to read the interactive session and display the session in clear text. SSH uses encryption to protect the session from view if captured. Encryption is a process that converts clear text into cipher text through an algorithm (such as 3DES, AES, etc.). The client and the server have to agree on the algorithm ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required