::Secure Shell


Shell::secure    Protocol::server    Remote::protocol    Client::which    OpenSSH::layer    Public::layer

{{#invoke:sidebar|sidebar | name = IPstack | title = Internet protocol suite | bodyclass = hlist

| heading1 = Application layer | content1 =

| heading2 = Transport layer | content2 =

| heading3 = Internet layer | content3 =

| heading4 = Link layer | content4 =

}} Secure Shell, or SSH, is a cryptographic (encrypted) network protocol to allow remote login and other network services to operate securely over an unsecured network.<ref name="rfc4251">

 Network Working Group of the IETF,
 January 2006,
 RFC 4251,
 The Secure Shell (SSH) Protocol Architecture


SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an SSH server.<ref name="rfc4252">

 Network Working Group of the IETF,
 January 2006,
 RFC 4252,
 The Secure Shell (SSH) Authentication Protocol

</ref> Common applications include remote command-line login and remote command execution, but any network service can be secured with SSH. The protocol specification distinguishes between two major versions, referred to as SSH-1 and SSH-2.

The most visible application of the protocol is for access to shell accounts on Unix-like operating systems, but it sees some limited use on Windows as well. In 2015, Microsoft announced that they would include native support for SSH in a future release.<ref>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>

SSH was designed as a replacement for Telnet and for unsecured remote shell protocols such as the Berkeley rlogin, rsh, and rexec protocols. Those protocols send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis.<ref>SSH Hardens the Secure Shell,</ref> The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet, although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH, allowing them to read the content of SSH sessions.<ref name=Spiegel2014>{{#invoke:citation/CS1|citation |CitationClass=web }}</ref>

Secure Shell sections
Intro  Definition  Key management  Usage  History and development  Uses  [[Secure_Shell?section={{safesubst:#invoke:anchor|main}}Architecture|{{safesubst:#invoke:anchor|main}}Architecture]]  Enhancements  Vulnerabilities  Standards documentation  See also  References  Further reading  External links  

PREVIOUS: IntroNEXT: Definition