Skip to main content

The SSH (Secure Shell) Remote Login Protocol
draft-ylonen-ssh-protocol-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Tatu Ylonen
Last updated 1995-11-16
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure networks. It is intended as a possible replacement for rsh, rlogin, rcp, and rdist. Ssh closes several security holes in existing remote login and file transfer protocols (IP spoofing, routing manipulation, DNS manipulation, trojan horses, man-in-the-middle attacks). Additionally, all communications are encrypted to ensure privacy and integrity. It automatically forwards X11 connections over the secure channel (providing secure X11 sessions and automatic secure authentication information distribution). Arbitrary TCP/IP ports can also be forwarded over the secure channel. An authentication agent permits authentication keys to reside on a laptop, or eventually even on a smartcard. Ssh also includes several convenience features, such as returning the correct exit status, automatic setting of DISPLAY and X11 authentication data, enhanced configurability, and the ability to run remote commands on a pty.

Authors

Tatu Ylonen

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)