Obsahuje:
  • všechny e-ziny od 9/1999
  • celou databázi NEWS
  • soutěže 2000-2011
  • další články a BONUSY

Security - News

http://crypto-world.info

Crypto - News | Security - News

01 / 2006
Vybrali pro vás: TR - Tomáš Rosa, JP - Jaroslav Pinkava, PV - Pavel Vondruška, VK - Vlastimil Klíma

RFC pro SSH (RFC 4250-54 - The Secure Shell Protocol ... )

09.01.2006

RFC 4250-54
Title: The Secure Shell (SSH) Protocol ...
Author(s): T. Ylonen, C. Lonvick, Ed. (S. Lehtinen)
Mailbox: ylo@ssh.com, clonvick@cisco.com
Status: Standards Track
Date: January 2006


RFC 4250
Title: The Secure Shell (SSH) Protocol Assigned Numbers
Pages: 20
URL: ftp://ftp.rfc-editor.org/in-notes/rfc4250.txt
This document defines the instructions to the IANA and the initial state of the IANA assigned numbers for the Secure Shell (SSH) protocol. It is intended only for the initialization of the IANA registries referenced in the set of SSH documents.


RFC 4251
Title: The Secure Shell (SSH) Protocol Architecture
Pages: 30
URL: ftp://ftp.rfc-editor.org/in-notes/rfc4251.txt
The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents.


RFC 4252
Title: The Secure Shell (SSH) Authentication Protocol
Pages: 17
URL: ftp://ftp.rfc-editor.org/in-notes/rfc4252.txt
The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH authentication protocol framework and public key, password, and host-based client authentication methods. Additional authentication methods are described in separate documents. The SSH authentication protocol runs on top of the SSH transport layer protocol and provides a single authenticated tunnel for the SSH connection protocol.


RFC 4253
Title: The Secure Shell (SSH) Transport Layer Protocol
Pages: 32
URL: ftp://ftp.rfc-editor.org/in-notes/rfc4253.txt
The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression. Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated. This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol.


RFC 4254
Title: The Secure Shell (SSH) Connection Protocol
Pages: 24
URL: ftp://ftp.rfc-editor.org/in-notes/rfc4254.txt
Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes the SSH Connection Protocol. It provides interactive login sessions, remote execution of commands, forwarded TCP/IP connections, and forwarded X11 connections. All of these channels are multiplexed into a single encrypted tunnel. The SSH Connection Protocol has been designed to run on top of the SSH transport layer and user authentication protocols.

Zdroj: ftp://ftp.rfc-editor.org/in-notes/rfc4250.txt
Autor: PV


<<- novější - Budoucí trendy malware
Windows Vista a bezpe?nostní aplikace t?etích stran - starší ->>
Design: Webdesign