SSH Learning Notes

Source: Internet
Author: User

1.ssh Brief Introduction

SSH (Secure SHell), a security protocol built on the application and transport tiers, provides security for Telnet sessions and other network services. Can effectively prevent information leakage during remote management, such as (Man-in-the-middle middleman), is an open source protocol , originated from UNIX.

Compare with Ftp,pop,telnet:

Ftp,pop and Telnet use plaintext to transmit passwords and data, while SSH uses encrypted transmissions and can prevent DNS and IP spoofing, and the transfer of SSH data is compressed to improve transmission speed.  SSH also has many other functions, such as: the use of PPP channel to establish a VPN; SSH can be used instead of ftp,pop and Telnet.

2. Two types of client security authentication levels for SSH

(1) Password-based

Encrypt the account and password and log in to the remote host, but there is no guarantee that the server you are connecting to is the one you want to connect to. So the server may be impersonating a man-in-the-middle attack.

(2) Key-based

Both the client and server must have your key, the connection is established by the comparison of the key, do not need to send a password, can prevent the man-in-the-middle attack, but the landing time is long.

3 Components of 3.SSH

(1) Transport layer Protocol [Ssh-trans]

(2) User authentication layer protocol [Ssh-userauth]

(3) Connection Agreement [Ssh-connect]

4.ssh1 and SSH2

SSH is divided into two versions that are incompatible with 1.x and 2.x. However, OPENSS supports these two versions at the same time.

Ssh-server is a daemon, generally the sshd process; Ssh-client includes SSH programs as well as applications such as SCP (remote copy), Slogin (telnet), SFTP (Secure file transfer), etc.

Common commands and options for 5.SSH

How to use: ssh [-l login_name] [hostname | [Email protected]] [Command] SSH [-afgknqtvxcpx246] [-C Blowfish | 3DES] [-E Escape_char] [-I. Identity_file] [-L login_name] [-o option] [-P Port] [-L Port:host:hostport] [-R Port:host:hostport] [hostname | [Email protected]] [Command]

(1) No parameter login ssh, will automatically use the current system login user name to log in, such as loger9567 ssh 192.168. 1.1

(2) Specify User name login ssh -l Roger 192.168. 1.1 or ssh [email protected]192.168. 1.1

(3) Specify Port (default:22) ssh 192.168. 1.2 -P 1234

(4) Compress ssh -c 192.168for all data requests. 1.2 is suitable for slow time, high-speed network is not good, in the SSH1 seems to not work

(5) Specify the encryption algorithm (DEFAULT:3DES) needs to modify the configuration file, in/etc/ssh/ssh_config or ~/.ssh/config to add a row Cipher blowfish #假如使用blowfish算法

(6) Open debug mode, tracking SSH connection situation: ssh -v 192.168. 0.102

(7) The binding source address (because one client may have more than one IP) ssh -b 192.168. 0.200 -L Roger 192.168. 1.1

(8) Display version: ssh -v 192.168. 1.1

(9) Specify the Authentication file: ssh -i identify_file 192.168. 1.1

(8) Other such as SSH x11 forwarding and designated configuration files, etc., used to re-check ...

SSH Learning Notes

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.