

The client sends a service request once a secure transport layerĬonnection has been established. O The Connection Protocol multiplexes the encrypted O The User Authentication Protocol authenticates theĬlient-side user to the server. Run over a TCP/IP connection, but might also be used on top of any It may optionallyĪlso provide compression. O The Transport Layer Protocol provides serverĪuthentication, confidentiality, and integrity. Secure network services over an insecure network. Secure Shell (SSH) is a protocol for secure remote login and other RFC 4251 SSH Protocol Architecture January 2006 1. Data Type Representations Used in the SSH Protocols. RFC 4251 SSH Protocol Architecture January 2006ġ. Details of these protocols are described in The Connection Protocol multiplexes the encrypted tunnel into several

User Authentication Protocol authenticates the client to the server. Transport Layer Protocol provides server authentication,Ĭonfidentiality, and integrity with perfect forward secrecy. The SSH protocol consists of three major components: The It alsoĭiscusses the SSH algorithm naming system that allows localĮxtensions. The notation and terminology used in SSH protocol documents. Thisĭocument describes the architecture of the SSH protocol, as well as The Secure Shell (SSH) Protocol is a protocol for secure remote loginĪnd other secure network services over an insecure network. Distribution of this memo is unlimited.Ĭopyright (C) The Internet Society (2006). Official Protocol Standards" (STD 1) for the standardization stateĪnd status of this protocol. Please refer to the current edition of the "Internet Internet community, and requests discussion and suggestions for This document specifies an Internet standards track protocol for the The Secure Shell (SSH) Protocol Architecture Request for Comments: 4251 SSH Communications Security CorpĬategory: Standards Track C.
