What is SSH?( Secure Shell )
Overview
SSH stands for Secure SHell. It is a secure protocol that allows secure file transfer and remote connections and logins over the untrusted computer network and Internet. The network connection and communication via SSH is encrypted allowing the secure connection.
SSH is a network protocol to log into another remote computer over a computer network. It provides strong authentication and secure communication over the untrusted network. Using SSH, all the information, commands, text are encrypted.
OpenSSH is the open-source implementation of the SSH protocol.
SSH Protocol Versions
SSH Protocol has two versions:
- SSH Version 1.0( Insecure)
- SSH Version 2.0
SSH version 1.0 is insecure and vulnerable. This version should NOT be used anymore. SSH version 2.0 is secure and strong cryptographic checks.
SSH Keys
The keys used in SSH authentication process are called as SSH keys. SSH Keys are public/private key pair. The keys are created together using PuTTYgen tool and ssh-keygen command. The public and private key are similar to a complex mathematical puzzle. The SSH keys are used during the authentication or login process.
SSH Connection Process
The public key resides on the server. The private key resides locally on the client’s computer. When the client attempts to authenticate to the remote server, the public and private key are compared. If the keys are matched, then the client will be authenticated to the server.
SSH Clients
SSH Clients like Putty allow us to make secure SSH connections to the server. We can import the private/public keys into the SSH client.
https://www.testingdocs.com/download-and-install-putty-on-windows/