First page Back Continue Last page Summary Graphics
Application Links (cont.)
Perimeter Defense
- Secure Shell - A replacement for the insecure r-commands (rsh, rexec, rlogin), for telnet and for ftp. These protocols send information (including passwords) in clear text that can be easily picked off of the wire by a sniffer. SSH encrypts all traffic between two hosts using strong cryptography.
- There are two major versions of ssh. One is ssh by DataFellows, which is commercial software. The other, OpenSSH, is done by the OpenBSD team.
- Both ssh version 1 and version 2 are available in OpenSSH, as well as bugfixes that are not in ssh.
- SSH, like many complex protocols, has had a number of security issues. Always make sure to keep abreast of vulnerabilities with these programs and upgrade to new versions as necessary.
Notes: