The Secure Shell (SSH) Authentication Protocol
Draft of message to be sent after approval:
From: The IESG <firstname.lastname@example.org> To: IETF-Announce <email@example.com> Cc: Internet Architecture Board <firstname.lastname@example.org>, RFC Editor <email@example.com>, secsh mailing list <firstname.lastname@example.org>, secsh chair <email@example.com> Subject: Protocol Action: 'SSH Protocol Architecture' to Proposed Standard The IESG has approved the following documents: - 'SSH Protocol Architecture ' <draft-ietf-secsh-architecture-23.txt> as a Proposed Standard - 'SSH Connection Protocol ' <draft-ietf-secsh-connect-26.txt> as a Proposed Standard - 'SSH Transport Layer Protocol ' <draft-ietf-secsh-transport-25.txt> as a Proposed Standard - 'SSH Authentication Protocol ' <draft-ietf-secsh-userauth-28.txt> as a Proposed Standard - 'SSH Protocol Assigned Numbers ' <draft-ietf-secsh-assignednumbers-13.txt> as a Proposed Standard These documents are products of the Secure Shell Working Group. The IESG contact persons are Russ Housley and Tim Polk. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-secsh-architecture-23.txt
Technical Summary SSH is a protocol for providing an authenticated, integrity protected and encrypted stream between two end-points. It can optionally provide compression as well as multiplexing several virtual streams within a single TCP connection. This multiplexing feature is particularly useful for "tunneling" other protocols such as the X Window System. A Main focus of the SSH protocol is to provide a transport for remote login from a client computer system to a server system. Working Group Summary There is working group consensus around this set of documents. Protocol Quality These documents were reviewed by Jeffrey I. Schiller for the IESG.