The secure shell protocol
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH]. It has three major components:
The Transport layer protocol
This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward secrecy.
The User authentication protocol
This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server.
The Connection protocol
This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels.
Several implementations of the secsh protocol suite exist.
The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]).
The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License.
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998
[SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998
[SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998
[SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998
[SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd.
This man-page was written by J.H.M. Dassen (Ray) <[email protected]>.