OpenSSH – remote login with the SSH protocol

OpenSSH is a free version of the SSH suite of network connectivity tools that increasing numbers of people on the Internet are coming to rely on.

OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other network-level attacks.

OpenSSH consists of a number of programs:

  • shd – Server program run on the server machine. This listens for connections from client machines, and whenever it receives a connection, it performs authentication and starts serving the client.
  • sh – This is the client program used to log into another machine or to execute commands on the other machine. slogin is another name for this program.
  • cp – Securely copies files from one machine to another.
  • sh-keygen – Used to create Pubkey Authentication (RSA or DSA) keys (host keys and user authentication keys).
  • sh-agent – Authentication agent. This can be used to hold RSA keys for authentication.
  • sh-add – Used to register new keys with the agent.
  • ftp-server – SFTP server subsystem.
  • ftp – Secure file transfer program.
  • sh-keyscan – gather ssh public keys.
  • sh-keysign – ssh helper program for hostbased authentication.

Features include:

  • Strong authentication. Closes several security holes (e.g., IP, routing, and DNS spoofing).
  • Improved privacy. All communications are automatically and transparently encrypted.
  • Secure X11 sessions. The program automatically sets DISPLAY on the server machine, and forwards any X11 connections over the secure channel.
  • Arbitrary TCP/IP ports can be redirected through the encrypted channel in both directions (e.g., for e-cash transactions).
  • No retraining needed for normal users.
  • Never trusts the network. Minimal trust on the remote side of the connection. Minimal trust on domain name servers. Pure RSA authentication never trusts anything but the private key.
  • Client RSA-authenticates the server machine in the beginning of every connection to prevent trojan horses (by routing or DNS spoofing) and man-in-the-middle attacks, and the server RSA-authenticates the client machine before accepting .rhosts or /etc/hosts.equiv authentication (to prevent DNS, routing, or IP-spoofing).
  • Host authentication key distribution can be centrally by the administration, automatically when the first connection is made to a machine.
  • Any user can create any number of user authentication RSA keys for his/her own use.
  • The server program has its own server RSA key which is automatically regenerated every hour.
  • An authentication agent, running in the user’s laptop or local workstation, can be used to hold the user’s RSA authentication keys.
  • The software can be installed and used (with restricted functionality) even without root privileges.
  • The client is customizable in system-wide and per-user configuration files.
  • Optional compression of all data with gzip (including forwarded X11 and TCP/IP
    port data), which may result in significant speedups on slow connections.
  • Complete replacement for rlogin, rsh, and rcp.

Website: www.openssh.com
Support: Manual Pages
Developer: The OpenBSD Project
License: BSD license

OpenSSH is written in C. Learn C with our recommended free books and free tutorials.

Return to Security Home Page


Popular series
Guide to LinuxNew to Linux? Read our Linux for Starters series. We start right at the basics and teach you everything you need to know to get started with Linux.
Free and Open Source SoftwareThe largest compilation of the best free and open source software in the universe. Each article is supplied with a legendary ratings chart helping you to make informed decisions.
ReviewsHundreds of in-depth reviews offering our unbiased and expert opinion on software. We offer helpful and impartial information.
Alternatives to Proprietary SoftwareReplace proprietary software with open source alternatives: Google, Microsoft, Apple, Adobe, IBM, Autodesk, Oracle, Atlassian, Corel, Cisco, Intuit, and SAS.
Linux Around The WorldLinux Around The World showcases events and usergroups that are relevant to Linux enthusiasts.
AudioSurveys popular streaming services from a Linux perspective: Amazon Music Unlimited, Myuzi, Spotify, Deezer, Tidal.
Saving Money with LinuxSaving Money with Linux looks at how you can reduce your energy bills running Linux.
System ToolsEssential Linux system tools focuses on small, indispensable utilities, useful for system administrators as well as regular users.
ProductivityLinux utilities to maximise your productivity. Small, indispensable tools, useful for anyone running a Linux machine.
Home ComputersHome computers became commonplace in the 1980s. Emulate home computers including the Commodore 64, Amiga, Atari ST, ZX81, Amstrad CPC, and ZX Spectrum.
Now and ThenNow and Then examines how promising open source software fared over the years. It can be a bumpy ride.
Linux at HomeLinux at Home looks at a range of home activities where Linux can play its part, making the most of our time at home, keeping active and engaged.
Linux CandyLinux Candy reveals the lighter side of Linux. Have some fun and escape from the daily drudgery.
DockerGetting Started with Docker helps you master Docker, a set of platform as a service products that delivers software in packages called containers.
Android AppsBest Free Android Apps. We showcase free Android apps that are definitely worth downloading. There's a strict eligibility criteria for inclusion in this series.
Programming BooksThese best free books accelerate your learning of every programming language. Learn a new language today!
Programming TutorialsThese free tutorials offer the perfect tonic to our free programming books series.
Stars and StripesStars and Stripes is an occasional series looking at the impact of Linux in the USA.
Share this article

Share your Thoughts

This site uses Akismet to reduce spam. Learn how your comment data is processed.