The SSH Cryptosystem

Monday, 18 November 2002, 12:42 PM EST

In this article you'll see how the SSH cryptosystem provides privacy protection, integrity, and authenticity of data as it traverses a network.

If you're using at least FreeBSD version 4.0, your FreeBSD system uses OpensSSH and it is installed and ready to go. As the name implies, this is an open source implementation of the SSH cryptosystem.

In a previous article I demonstrated that the telnet utility can be used to login to a remote computer from another system. Once logged in, a user can do anything on that remote system as if he were physically sitting in front of it. That is, every keystroke is sent to the remote system and interpreted as if it had come from the keyboard attached to that remote system (even though that keyboard input first had to travel over a network). We also saw in that article that every single keystroke and response was sent in clear text, meaning that a sniffer could watch the entire session.

[ Read more ]




Spotlight

Planning for the Internet of Things

As organizations plan for the future, and how security has to operate within their business, they now have to worry about the IoT. Geoff Webb, Director of Solution Strategy at NetIQ, discusses the implications and likely impact of the Internet of Things.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Apr 28th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //