Question

Describe the salient characteristics of the IETF RFC 4251 Secure Shell (SSH) protocol including its relationship...

  • Describe the salient characteristics of the IETF RFC 4251 Secure Shell (SSH) protocol including its relationship to the OSI and TCP/IP networking models, and discuss any security mechanisms that the protocol may have built into it.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

The Secure Shell (SSH) is a protocol used for secure remote login. The major components of SSH are Data confidentiality, Authentication and integrity services. SSH was created by T.Ylonen of Helsinki University(Finland). The SSH provides both server and client authentication.

Internet Engineering Task Force’s official name for the SSH1 protocol was “secsh”. SSH has two generations: SSH1 and SSH2. The documents for SSH2 was published as RFC in 2006. A Request for Comments (RFC) is a document from the Internet Engineering Task Force(IETF). It is formed after committee drafting and repeated reviews. RFC becomes the Internet standards and then further changes are not allowed.

The salient characteristics of the IETF RFC 4251 Secure Shell (SSH) protocol are:

1)Strong authentication with SSH keys

2)SSH provides strong encryption and integrity protection.

3)Secure Remote Logins

4)Secure File Transfer

5)Secure Remote Command Execution

6)Access Control

7)Port forwarding

8)SSH is widely used for remote commands

9)SSH is used for controlling network infrastructure in corporate networks.

10)SSH can facilitate automated file transfers.

11)Interoperability

12)Optional data compression

SSH is an OSI model application layer protocol. It uses cryptography to enable remote login and other network services. SSH is also present in TCP and it encrypts the data inside a TCP packet. When two nodes are using SSH to establish a TCP/IP connection, the protocol version and the software information is exchanged initially. Then the keys are exchanged. The client will request a service on completion of the SSH Transport Layer Protocol.

The main aim of SSH is to enhance security on the Internet. The encryption and algorithms are well known. These algorithms can withstand even strongest cryptanalytic attacks. If in case one algorithm is broken, it can easily switch into another algorithm without changing the base protocol.

SSH mainly uses three manipulation techniques to provide secure connections. These include symmetrical encryption, asymmetrical encryption and hashing. In symmetrical encryption a single key is used to encrypt and decrypt messages. While in asymmetric encryption a private key and a public key is used to send data in encrypted form. Hashing is another data manipulation technique used in SSH. Cryptographic hash functions are used in this method.

Add a comment
Know the answer?
Add Answer to:
Describe the salient characteristics of the IETF RFC 4251 Secure Shell (SSH) protocol including its relationship...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and...

    Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....

  • 1.Define what a linear program/linear programing model is including its three key characteristics. Be sure to...

    1.Define what a linear program/linear programing model is including its three key characteristics. Be sure to state those characteristics fully. 2.Some models are deterministic while others are stochastic. Discuss two key differences between deterministic models and stochastic models. Then further demonstrate your understanding of these two different kinds of models by providing an example of a stochastic model including at least two input variables and an example of a deterministic model including at least two input variables. 3.Every linear program/linear...

  • Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable...

    Explain what enterprise resource planning (ERP) systems. Outline several of their key characteristics. Describe in reasonable detail how a company leverages an ERP system and how its operations are improved after installing an ERP system like SAP. Explain how a supply chain management system helps an organization make its operations more efficient What is Upstream and Downstream management of the supply chain? Explain the concept of “Supply Network”, its benefits, and how technology made this concept available Explain the difference...

  • I wanted to update you on my efforts to secure an increased line of credit for...

    I wanted to update you on my efforts to secure an increased line of credit for working capital. Despite my repeated efforts and the calls that both of you have made to our bank's senior officers, Miami Dade Merchant's Bank (MDM) continues to be inflexible. It refuses to increase our $3.2 million line of credit and says that it will not change its mind. It is also proposing tighter covenants. I have highlighted for MDM our improved EBIT and free...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • 1. According to the paper, what does lactate dehydrogenase (LDH) do and what does it allow...

    1. According to the paper, what does lactate dehydrogenase (LDH) do and what does it allow to happen within the myofiber? (5 points) 2. According to the paper, what is the major disadvantage of relying on glycolysis during high-intensity exercise? (5 points) 3. Using Figure 1 in the paper, briefly describe the different sources of ATP production at 50% versus 90% AND explain whether you believe this depiction of ATP production applies to a Type IIX myofiber in a human....

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT