DESCRIPTION

secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH]. It has three major components:

The Transport layer protocol

This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward secrecy.

The User authentication protocol

This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server.

The Connection protocol

This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels.

IMPLEMENTATIONS

Several implementations of the secsh protocol suite exist.

The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]).

The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License.

REFERENCES

[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998

[SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998

[SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998

[SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998

[SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995

TRADEMARKS

SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd.

AUTHOR

This man-page was written by J.H.M. Dassen (Ray) <[email protected]>.

RELATED TO secsh…

lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8)