SSH

 SSH 

SSH (Secure Shell) - It is a network protocol used for performing operation on network services securely over a less secured network like internet. It provides a channel which is secured for remote log in to any system. Any service on the network can be made secure by SSH. It provides a better option for authentication by implementing strong encryption of data. Over a client-server architecture the SSH provides a secure channel from the client application to the server computer.


SSH stands for Secure Shell.

shell is a piece of software that allows you to communicate with the core of your operating system. This is typically done via a command line interface.

You don’t need to be at a computer to access a shell. A shell account is a personal account that lets you access a shell from a different computer. These used to be commonplace, used to access files, email, news, and more.

A web browser uses the HTTP to communicate with websites. Whereas, a shell account uses a different protocol…..It uses public key encryption to provide more security than other insecure shell protocols such as FTP or Telnet


Uses of SSH-

 On client-server architecture there are several uses of SSH under many different context, following are some of the uses of SSH:

· SSH provide secure access to remote systems.

· It provides passing of commands on remote host.

· Through SSH we can manage the infrastructure of network and many different system components.

· Using SSH we can transfer files by using SSH file transfer (S FTP) or Secure Copy Protocol (S C P).

· It is used in Cloud Computing for providing security


Apart from host authentication, data encryption & data integrity, it offers other benefits like compression which is performed before encryption which can significantly reduce the computational cost of encrypting data.

Public & Private key


Remember in the Movies, when the lovers separated, they broke a necklace or medallion in half? Only when they got back together, could they put it as one, and true love win the day? Same thing.

The SSH key pair is a private key, and a public key. The private key is THE key.

The public key is something you hand out to anyone. Even the bad guys.

Now we are all one happy encrypting family, but only the chaps with the PUBLIC and PRIVATE keys can put it together, and win the day.


The public key can be used to encrypt messages that only the private key can decrypt. 

The public key is uploaded to a remote server that you want to be able to log into with SSH. The key is added to a special file within the user account you will be logging into called ~/.ssh/authorized_key

When a client attempts to authenticate using SSH keys, the server can test the client on whether they are in possession of the private key. If the client can prove that it owns the private key, a shell session is spawned or the requested command is executed.

Comments

Popular posts from this blog

Read and Navigate XML - Beautiful Soup

difference-between-stream-processing-and-message-processing

WordNet in Python