next up previous contents
Next: Escape sequences Up: SSH: Connecting Securely to Previous: SSH: Connecting Securely to   Contents

slogin, ssh: Secure telnet

ssh [-l login] node
or
ssh [login@]node
allows user login to initiate a session with system node.

slogin is another name for the ssh command. Both work the same way - only the name differs.

If there is not a proper .rhosts or .shosts file entry, a password will be required. That password will NOT be sent in plain text. It will be sent in encryption form.

The default encryption method uses RSA encryption and decryption, using the public/private key scheme: during the initial handshake between the two systems, they exchange their public keys (encryption keys). When any message is sent to the other party, it is first encrypted using that party's public key. When the message is received, it is read using the host's own private (or decryption) key.

The private key is NEVER given to anyone. Only the public key is.

The public key encrypts messages, while the private key decrypts them. Even is the message is intercepted by a third party, they cannot decrypt it because they have no access to the private key of the destination host.

The session is therefore secure.

Most RCSG supported SGI/IRIX NRC systems configured to use SSH have had their telnet and rlogin commands modified so that they use the SSH protocol if the remote host will accept it.



Subsections
next up previous contents
Next: Escape sequences Up: SSH: Connecting Securely to Previous: SSH: Connecting Securely to   Contents
Claude Cantin 2010-10-24