What protocols does Secure Shell use?
http://www.snailbook.com/docs/protocol-1.5.txt The SSH (Secure Shell) Remote Login Protocol <<>> Introduction SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over insecure networks. Its features include the following: o Closes several security holes (e.g., IP, routing, and DNS spoof- ing). New authentication methods: .rhosts together with RSA [RSA] based host authentication, and pure RSA authentication. o All communications are automatically and transparently encrypted. Encryption is also used to protect integrity. o X11 connection forwarding provides secure X11 sessions. o Arbitrary TCP/IP ports can be redirected over the encrypted channel in both directions. Internet-Draft SSH (Secure Shell) Remote Login Protocol15 November 1995 o Clie
It should be noted that the SSH1 and SSH2 protocols are in fact different and not compatible with each other. For the SSH1 protocol, you can find this information in an old IETF draft available here. It is also available with the latest source distribution for SSH1 at ftp.ssh.com/pub/ssh/ssh-1.2.27.tar.gz. For the SSH2 protocol, you can find this information in the SSH2 IETF drafts: • http://www.ietf.org/ids.by.wg/secsh.html The fifth IETF draft for Secure Shell, Generic Message Exchange Authentication For Secure Shell is no longer available and expired after 6 months.