CHAPTER 25 Secure Shell (Remote Access)
What You Will Learn
In this chapter, you will learn how the secure shell (SSH) is used as a more secure method of remote access than Telnet. We’ll talk about the SSH model, features, and architectures.
You will learn how the SSH protocols operate and how keys are distributed. We’ll do a simple example of Diffie-Hellman key distribution using only a pocket calculator and no advanced mathematics.
Not too long ago, most TCP/IP books would routinely cover Telnet as the Internet application for remote access. But today, with the focus on security the Telnet daemon is considered just too dangerous to leave running on hosts and routers, mainly because it is such a tempting target even when password encryption ...