SSH service features

The secure shell protocol offers a series of interesting features, which has become the most-used protocol by all users who manage some type of Linux server, either in the cloud or dedicated. Let's highlight some of its features:

  • The use of SSH encrypts the registration session, which prevents anyone from getting non-encrypted passwords.
  • The encryption keys that are used are only known by those who issue the information and receive it.
  • Modifying the key could modify the original message, which means that if a third-party obtains the key, it cannot access the complete message.
  • The user can verify that they are still connected to the same server that was initially connected.
  • When a user authenticates, an encrypted secure channel is created between them and the server to exchange the information with total guarantee.
  • The data that's sent and received through the use of SSH is done through encryption algorithms, where the recommended minimum key size is 1,024 bits, which makes it very difficult to decipher and read.
  • The client can use applications securely from the server's command interpreter, which allows them to manage the machine as if they were in front of it.
  • The use of SSH is also used as an encrypted channel to protect protocols that do not use default encryption, such as port-forwarding techniques.

From a security point of view, the SSH protocol provides the following types of protection:

  • Once the client has established the initial connection, it is possible to check whether it is connecting to the same server it was initially connected to.
  • The client uses a robust encryption, 128-bit, to send authentication information to the server.
  • All traffic that is sent and received during communication is transferred through a 128-bit encryption.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset