{"id":20416,"date":"2017-07-26T15:47:43","date_gmt":"2017-07-26T15:47:43","guid":{"rendered":"https:\/\/www.testingdocs.com\/questions\/?p=20416"},"modified":"2024-09-04T07:24:48","modified_gmt":"2024-09-04T07:24:48","slug":"what-is-ssh-secure-shell","status":"publish","type":"post","link":"https:\/\/www.testingdocs.com\/questions\/what-is-ssh-secure-shell\/","title":{"rendered":"What is SSH?( Secure Shell )"},"content":{"rendered":"<h2>What is SSH?( Secure Shell )<\/h2>\n<p>SSH stands for Secure SHell. It is a secure protocol that allows secure file transfer and remote connections and logins over the untrusted computer network and Internet. The network connection and communication via SSH is encrypted allowing the secure connection.<\/p>\n<p>SSH is a network protocol to log into another remote computer over a computer network. It provides strong authentication and secure communication over the untrusted network. Using SSH, all the information, commands, text are encrypted.<\/p>\n<p><strong>OpenSSH<\/strong> is the open-source implementation of the SSH protocol.<\/p>\n<h3>SSH Protocol Versions<\/h3>\n<p>SSH Protocol has two versions:<\/p>\n<ul>\n<li>SSH Version 1.0( Insecure)<\/li>\n<li>SSH Version 2.0<\/li>\n<\/ul>\n<p>SSH version 1.0 is insecure and vulnerable. This version should NOT be used anymore. SSH version 2.0 is secure and strong cryptographic checks.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-20441 size-full\" title=\"Secure Shell\" src=\"https:\/\/www.testingdocs.com\/questions\/wp-content\/uploads\/SSH-Connections.png\" alt=\"Secure Shell\" width=\"1324\" height=\"1083\" srcset=\"https:\/\/www.testingdocs.com\/questions\/wp-content\/uploads\/SSH-Connections.png 1324w, https:\/\/www.testingdocs.com\/questions\/wp-content\/uploads\/SSH-Connections-300x245.png 300w, https:\/\/www.testingdocs.com\/questions\/wp-content\/uploads\/SSH-Connections-1024x838.png 1024w, https:\/\/www.testingdocs.com\/questions\/wp-content\/uploads\/SSH-Connections-768x628.png 768w\" sizes=\"auto, (max-width: 1324px) 100vw, 1324px\" \/><\/p>\n<h3>SSH Keys<\/h3>\n<p>The keys used in SSH authentication process are called as SSH keys. SSH Keys are public\/private key pair. The keys are created together using <strong>PuTTYgen<\/strong> tool and <strong>ssh-keygen<\/strong> command. The public and private key are similar to a complex mathematical puzzle. The SSH keys are used during the authentication or login process.<\/p>\n<h3>SSH Connection Process<\/h3>\n<p>The public key resides on the server. The private key resides locally on the client&#8217;s computer. When the client attempts to authenticate to the remote server, the public and private key are compared. If the keys are matched, then the client will be authenticated to the server.<\/p>\n<h3>SSH Clients<\/h3>\n<p>SSH Clients like Putty allow us to make secure SSH connections to the server. We can import the private\/public keys into the SSH client.<\/p>\n<p><a href=\"https:\/\/www.testingdocs.com\/download-and-install-putty-on-windows\/\">https:\/\/www.testingdocs.com\/download-and-install-putty-on-windows\/<\/a><\/p>\n<h3>More Information:<\/h3>\n<p><a href=\"https:\/\/www.ssh.com\/academy\/ssh\" rel=\"noopener\">https:\/\/www.ssh.com\/academy\/ssh<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is SSH?( Secure Shell ) SSH stands for Secure SHell. It is a secure protocol that allows secure file transfer and remote connections and logins over the untrusted computer network and Internet. The network connection and communication via SSH is encrypted allowing the secure connection. SSH is a network protocol to log into another [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-20416","post","type-post","status-publish","format-standard","hentry","category-testing-questions","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"_links":{"self":[{"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/posts\/20416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/comments?post=20416"}],"version-history":[{"count":40,"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/posts\/20416\/revisions"}],"predecessor-version":[{"id":24078,"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/posts\/20416\/revisions\/24078"}],"wp:attachment":[{"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/media?parent=20416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/categories?post=20416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.testingdocs.com\/questions\/wp-json\/wp\/v2\/tags?post=20416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}