Trabalho sobre ssh
This article discusses about Secure Shell or SSH is a network protocol that allows users to open a window on a local computer and connect to a remote computer as if they were in front of the computer.
SSH allows data to be exchanged using a secure channel between two networked devices. The two major versions of the protocol are referred to as SSH1 or SSH-1 and SSH2 or SSH-2. Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for Telnet and other insecure remote shells, which send information, notably passwords, in plaintext, rendering them susceptible to packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet. So SSH is designed to eliminate some problems and weaknesses present in normal IP traffic, such as: authentication disabled, lack of privacy and lack of integrity protection. This protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. All the above issues are treated in greater depth throughout the article.
Neste artigo procuramos abordar sobre o Secure Shell ou SSH que é um protocolo de rede que permite aos usuários abrir uma janela em um computador local e se conectar a um computador remoto como se estivesse em frente ao computador. O
SSH permite que dados sejam trocados através de um canal seguro entre dois dispositivos em rede. As duas principais versões do protocolo são conhecidas como SSH1 ou SSH-1 e SSH2 ou SSH-2. Usado principalmente em sistemas Linux e Unix com base para acessar contas shell, SSH foi concebido como um substituto para o Telnet e outros métodos inseguros de acesso remoto que enviam informações,