身上长水泡是什么原因| 执勤是什么意思| 榴莲什么人不适合吃| 吃饭后胃疼是什么原因| 无蒂息肉是什么意思| 萝卜喝醉了会变成什么| 吃什么主食减肥最快| 无锡机场叫什么名字| 梦见别人给钱是什么意思| 老是口干舌燥是什么原因| 怼人是什么意思| 急性胃肠炎用什么药| 打篮球有什么好处| 尿出血是什么原因| lka是什么意思| 不甚感激是什么意思| 血脂高看什么指标| 指甲有白点是缺什么| 口腔癌早期有什么征兆| 苦荞茶喝了有什么好处| 香奈儿是什么牌子| 龋齿什么意思| 保护声带喝什么| 功能是什么意思| 韩国的思密达是什么意思| 纪委是干什么的| 掉头发吃什么药最有效| 刻舟求剑的意思是什么| 帆布是什么材质| 7是什么生肖| 舌苔厚腻是什么原因| 针眼是什么原因引起的| 脱发是什么原因| 幼儿急疹是什么原因引起的| 怂包是什么意思| 子宫腺肌症有什么症状| 知鸟吃什么| 小沙弥是什么意思| 简单是什么意思| ptt是什么| 6月28是什么星座| 老放屁什么原因| 幽门螺杆菌是什么症状| 宫内膜回声欠均匀是什么意思| 芒果对身体有什么好处| 名媛是什么意思| 洋葱炒什么好吃| 喉咙痒吃什么药好| 鹌鹑蛋是什么动物的蛋| csf是什么意思| 试管移植后吃什么容易着床| 苏州市长什么级别| 01年属什么生肖| 2月11日是什么星座| 总是干咳是什么原因| 一个三点水一个及念什么| 什么地移入| 费力不讨好是什么生肖| 吕洞宾代表什么生肖| 宫颈筛查hpv阳性是什么意思| 精神卫生科看什么病| 佳人是什么生肖| wv是什么意思| 送巧克力代表什么意思| 青春期指什么年龄段| 肠胃不好喝什么奶粉好| 宸字五行属什么| 吃什么水果对皮肤好又美白| 味淋可以用什么代替| mr是什么的缩写| 副局级干部是什么级别| 榨菜是什么菜| 鹌鹑蛋不能和什么一起吃| 碱性磷酸酶是什么| 什么是翡翠| 巡礼是什么意思| 虐心是什么意思| 小孩牙疼有什么办法| 犹怜是什么意思| 阴道发臭是什么原因| 堂食是什么意思| 拔罐拔出水泡是什么原因| 梦见血是什么预兆解梦| 睡前吃什么有助于睡眠| 外科是看什么病的| 物业费都包括什么服务| 刘晓庆什么星座| 疣是什么原因造成的| 排骨炖什么好吃| 9月27日是什么星座| 大材小用是什么生肖| it是什么牌子的衣服| 肝阳虚吃什么中成药| 萎了是什么意思| 淡是什么意思| 去湿气吃什么最好| 接济是什么意思| 心肌缺血有什么症状| 吃什么补维生素b| 硫酸羟氯喹片治什么病| 大便少是什么原因| 大三阳转小三阳意味着什么| 东海龙王叫什么| 65年属什么| 印度人为什么叫阿三| 肾宝片是什么| 马克杯是什么意思| 射手女喜欢什么样的男生| 牡丹象征着什么意义| 实体店是什么意思| 经常干咳是什么原因| 黑猫进家门预示着什么| 抑扬顿挫什么意思| 为什么会乳糖不耐受| 为什么抽血要空腹| 00属什么生肖| 怀孕打黄体酮针有什么作用| 什么是无产阶级| 米白色是什么颜色| jomalone是什么牌子| 阿奇霉素主治什么| 毫无保留什么意思| 日光性皮炎用什么药膏| 乳腺结节低回声是什么意思| 什么是沙龙| 水鱼是什么| 伏特加是用什么酿造的| 一元硬币是什么材质| ot是什么| 一月14号是什么星座| 黄帝叫什么| 鼻窦粘膜增厚什么意思| 老鹰的绝症是什么| usp是什么意思| 热痱子用什么药| 脸水肿是什么原因| 枣子什么时候成熟| 定妆用什么好| 洛阳有什么好吃的| 东星斑为什么这么贵| pass掉是什么意思| 1965年属什么| 手指甲发白是什么原因| 耳朵疼是什么原因| 虚岁28岁属什么生肖| 生机勃勃什么意思| 4月6日什么星座| hpvhr阳性什么意思| vg是什么意思| 莓茶什么人不适合喝| 乳腺1类是什么意思| 疱疹用什么药膏最有效| 梦见给别人剪头发是什么意思| 宫内感染有什么症状| 喝大麦茶有什么好处| 纤维条索灶是什么意思| 正装是什么样的衣服| 疱疹用什么药可以根治| 老年人腿疼是什么原因引起的| 语感是什么意思| 为什么腋下有异味| 世界七大奇迹分别是什么| 健身前吃什么比较好| 丙是什么意思| 醋精是什么| kim是什么意思| 额头发黑是什么原因| 羡慕不来是什么意思| 痔疮挂什么科室| 肌酸粉有什么作用| 什么是社会考生| 胆毛糙是什么原因| edm是什么意思| 苏轼是什么派词人| 细什么细什么| 吃什么对肝脏好| super star是什么意思| 郎酒是什么香型| 眼底出血吃什么药| 感冒为什么会全身酸痛无力| 肾结石有什么症状表现| 心脏病是什么原因引起的| 艺高人胆大什么意思| 眩晕是什么原因引起的| 伯伯的儿子叫什么| 牙疼吃什么药效果最好| 08年是什么年| 石光荣是什么军衔| 鼻炎不能吃什么| 梦见蛇预示着什么| 梦见彩虹是什么征兆| 成吉思汗是什么意思| 文心什么字| 报仇是什么意思| 筋膜提升术是什么| 苹果五行属什么| 弓形虫是什么| 神经痛吃什么药| 女性尿频繁是什么原因| 牙齿流血是什么原因| 铁锭是什么意思| 梦见娃娃是什么意思| 儿女情长英雄气短是什么意思| 脚疼是什么原因| 衣冠禽兽指什么生肖| 吃什么治拉肚子| 四不放过是指什么| 蒹葭是什么| 收支两条线是什么意思| 孩子生化了是什么意思| 为什么老是拉肚子| 7月28日什么星座| 偏食是什么意思| 趴在桌子上睡觉有什么坏处| 牛蒡是什么| 天蝎和什么星座最配| screenx影厅是什么| 肝内钙化斑是什么意思| 梦见掉了三颗牙齿是什么意思| shipped是什么意思| 中国第一个不平等条约是什么| 1为什么读yao| 多动症是什么| 灰指甲用什么药好| 人人有的是什么生肖| wlw是什么意思| 吸毒是什么感觉| 眼角痒用什么眼药水好| 老鼠喜欢吃什么| 百合是什么颜色| 陶渊明是什么先生| 什么动物吃猫| 钾高了会出现什么症状| 海带和什么菜搭配好吃| 奶奶的奶奶叫什么| 很nice什么意思| 牛油果吃了有什么好处| 智齿为什么会疼| 肺寒吃什么药| 小孩吃榴莲有什么好处| 左手发麻什么原因| 刚怀孕吃什么好| 赵字五行属什么| 脸上起红疙瘩是什么原因| ua是什么单位| 胆囊炎要吃什么药| 机器灵砍菜刀是什么意思| 薏米长什么样子的图片| 牡丹象征着什么意义| 野什么意思| 咳嗽白痰是什么原因| 袖珍人是什么意思| 灰指甲用什么药治疗| 小狗拉稀 吃什么药| 吃什么补肾最快最有效| 卵巢囊肿是什么引起的| lisa英文名什么意思| 腹部左侧是什么器官| 鬼节会开什么生肖| 牛肉饺子馅配什么蔬菜| 可乐喝多了有什么危害| 饕餮是什么| 突然长胖很多是什么原因| 豁口是什么意思| 百度

Chapter?14.?OpenSSH


SSH (Secure Shell) is a protocol which facilitates secure communications between two systems using a client-server architecture and allows users to log into server host systems remotely. Unlike other remote communication protocols, such as FTP, Telnet, or rlogin, SSH encrypts the login session, rendering the connection difficult for intruders to collect unencrypted passwords.
The ssh program is designed to replace older, less secure terminal applications used to log into remote hosts, such as telnet or rsh. A related program called scp replaces older programs designed to copy files between hosts, such as rcp. Because these older applications do not encrypt passwords transmitted between the client and the server, avoid them whenever possible. Using secure methods to log into remote systems decreases the risks for both the client system and the remote host.
Red Hat Enterprise Linux includes the general OpenSSH package, openssh, as well as the OpenSSH server, openssh-server, and client, openssh-clients, packages.

14.1. The SSH Protocol

14.1.1. Why Use SSH?

Potential intruders have a variety of tools at their disposal enabling them to disrupt, intercept, and re-route network traffic in an effort to gain access to a system. In general terms, these threats can be categorized as follows:
Interception of communication between two systems
The attacker can be somewhere on the network between the communicating parties, copying any information passed between them. He may intercept and keep the information, or alter the information and send it on to the intended recipient.
This attack is usually performed using a packet sniffer, a rather common network utility that captures each packet flowing through the network, and analyzes its content.
Impersonation of a particular host
Attacker's system is configured to pose as the intended recipient of a transmission. If this strategy works, the user's system remains unaware that it is communicating with the wrong host.
This attack can be performed using a technique known as DNS poisoning, or via so-called IP spoofing. In the first case, the intruder uses a cracked DNS server to point client systems to a maliciously duplicated host. In the second case, the intruder sends falsified network packets that appear to be from a trusted host.
Both techniques intercept potentially sensitive information and, if the interception is made for hostile reasons, the results can be disastrous. If SSH is used for remote shell login and file copying, these security threats can be greatly diminished. This is because the SSH client and server use digital signatures to verify their identity. Additionally, all communication between the client and server systems is encrypted. Attempts to spoof the identity of either side of a communication does not work, since each packet is encrypted using a key known only by the local and remote systems.

14.1.2. Main Features

The SSH protocol provides the following safeguards:
No one can pose as the intended server
After an initial connection, the client can verify that it is connecting to the same server it had connected to previously.
No one can capture the authentication information
The client transmits its authentication information to the server using strong, 128-bit encryption.
No one can intercept the communication
All data sent and received during a session is transferred using 128-bit encryption, making intercepted transmissions extremely difficult to decrypt and read.
Additionally, it also offers the following options:
It provides secure means to use graphical applications over a network
Using a technique called X11 forwarding, the client can forward X11 (X Window System) applications from the server. Note that if you set the ForwardX11Trusted option to yes or you use SSH with the -Y option, you bypass the X11 SECURITY extension controls, which can result in a security threat.
It provides a way to secure otherwise insecure protocols
The SSH protocol encrypts everything it sends and receives. Using a technique called port forwarding, an SSH server can become a conduit to securing otherwise insecure protocols, like POP, and increasing overall system and data security.
It can be used to create a secure channel
The OpenSSH server and client can be configured to create a tunnel similar to a virtual private network for traffic between server and client machines.
It supports the Kerberos authentication
OpenSSH servers and clients can be configured to authenticate using the GSSAPI (Generic Security Services Application Program Interface) implementation of the Kerberos network authentication protocol.

14.1.3. Protocol Versions

Two varieties of SSH currently exist: version 1 and version 2. The OpenSSH suite under Red Hat Enterprise Linux uses SSH version 2, which has an enhanced key exchange algorithm not vulnerable to the known exploit in version 1. However, for compatibility reasons, the OpenSSH suite does support version 1 connections as well, although version 1 is disabled by default and needs to be enabled in the configuration files.
百度   驼铃相闻,文明远行并拥抱;千年以降,人民远行并交好。

Important

For maximum security, avoid using SSH version 1 and use SSH version 2-compatible servers and clients whenever possible.

14.1.4. Event Sequence of an SSH Connection

The following series of events help protect the integrity of SSH communication between two hosts.
  1. A cryptographic handshake is made so that the client can verify that it is communicating with the correct server.
  2. The transport layer of the connection between the client and remote host is encrypted using a symmetric cipher.
  3. The client authenticates itself to the server.
  4. The client interacts with the remote host over the encrypted connection.

14.1.4.1. Transport Layer

The primary role of the transport layer is to facilitate safe and secure communication between the two hosts at the time of authentication and during subsequent communication. The transport layer accomplishes this by handling the encryption and decryption of data, and by providing integrity protection of data packets as they are sent and received. The transport layer also provides compression, speeding the transfer of information.
Once an SSH client contacts a server, key information is exchanged so that the two systems can correctly construct the transport layer. The following steps occur during this exchange:
  • Keys are exchanged
  • The public key encryption algorithm is determined
  • The symmetric encryption algorithm is determined
  • The message authentication algorithm is determined
  • The hash algorithm is determined
During the key exchange, the server identifies itself to the client with a unique host key. If the client has never communicated with this particular server before, the server's host key is unknown to the client and it does not connect. OpenSSH notifies the user that the authenticity of the host cannot be established and prompts the user to accept or reject it. The user is expected to independently verify the new host key before accepting it. In subsequent connections, the server's host key is checked against the saved version on the client, providing confidence that the client is indeed communicating with the intended server. If, in the future, the host key no longer matches, the user must remove the client's saved version before a connection can occur.

Warning

Always verify the integrity of a new SSH server. During the initial contact, an attacker can pretend to be the intended SSH server to the local system without being recognized. To verify the integrity of a new SSH server, contact the server administrator before the first connection or if a host key mismatch occurs.
SSH is designed to work with almost any kind of public key algorithm or encoding format. After an initial key exchange creates a hash value used for exchanges and a shared secret value, the two systems immediately begin calculating new keys and algorithms to protect authentication and future data sent over the connection.
After a certain amount of data has been transmitted using a given key and algorithm (the exact amount depends on the SSH implementation), another key exchange occurs, generating another set of hash values and a new shared secret value. Even if an attacker is able to determine the hash and shared secret value, this information is only useful for a limited period of time.

14.1.4.2. Authentication

Once the transport layer has constructed a secure tunnel to pass information between the two systems, the server tells the client the different authentication methods supported, such as using a private key-encoded signature or typing a password. The client then tries to authenticate itself to the server using one of these supported methods.
SSH servers and clients can be configured to allow different types of authentication, which gives each side the optimal amount of control. The server can decide which encryption methods it supports based on its security model, and the client can choose the order of authentication methods to attempt from the available options.

14.1.4.3. Channels

After a successful authentication over the SSH transport layer, multiple channels are opened via a technique called multiplexing[4]. Each of these channels handles communication for different terminal sessions and for forwarded X11 sessions.
Both clients and servers can create a new channel. Each channel is then assigned a different number on each end of the connection. When the client attempts to open a new channel, the clients sends the channel number along with the request. This information is stored by the server and is used to direct communication to that channel. This is done so that different types of sessions do not affect one another and so that when a given session ends, its channel can be closed without disrupting the primary SSH connection.
Channels also support flow-control, which allows them to send and receive data in an orderly fashion. In this way, data is not sent over the channel until the client receives a message that the channel is open.
The client and server negotiate the characteristics of each channel automatically, depending on the type of service the client requests and the way the user is connected to the network. This allows great flexibility in handling different types of remote connections without having to change the basic infrastructure of the protocol.


[4] A multiplexed connection consists of several signals being sent over a shared, common medium. With SSH, different channels are sent over a common secure connection.
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red?Hat Documentation

We help Red?Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red?Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red?Hat Blog.

About Red?Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

? 2025 Red Hat
坐怀不乱柳下惠什么意思 没有高中毕业证有什么影响 肠易激综合征中医叫什么 什么是崩漏 石斛什么价格
玫瑰的花语是什么 七叶一枝花主治什么病 葛根和什么搭配泡水好 梦见自己吃面条是什么意思 纳肛是什么意思
2月2日是什么星座 mop是什么意思 身宫是什么意思 什么叫化疗为什么要化疗 带鱼为什么是扁的
百合花什么时候种植 喉咙不舒服看什么科 荨麻疹有什么忌口吗 salomon是什么牌子 藏族信仰什么教
调理牛肉是什么意思hcv7jop6ns5r.cn 梦见豹子是什么预兆hcv9jop1ns0r.cn 妈宝女是什么意思hcv8jop8ns5r.cn 转氨酶高是什么问题hcv9jop0ns3r.cn 杏和什么不能一起吃wmyky.com
籍贯一般填什么hcv8jop1ns0r.cn 9月28是什么星座hcv9jop4ns8r.cn 次数是什么hcv9jop6ns5r.cn 手臂痛挂什么科hcv8jop1ns4r.cn 扭捏是什么意思hcv8jop7ns9r.cn
脑疝是什么意思hcv7jop6ns3r.cn 流星是什么kuyehao.com 托塔李天王的塔叫什么hcv8jop9ns3r.cn 俱往矣是什么意思gangsutong.com 尿蛋白是什么原因hcv9jop0ns4r.cn
高血压需要注意什么hcv9jop2ns2r.cn 1月生日是什么星座hcv8jop4ns3r.cn 右眼老跳是什么原因hcv8jop5ns3r.cn 寒窗是什么意思hcv8jop3ns3r.cn 早晨起来口干舌燥是什么原因hcv8jop1ns9r.cn
百度