Sponsored Content
Special Forums Cybersecurity What's the difference between an SSH Client and an SSH Server? Post 53563 by norsk hedensk on Monday 19th of July 2004 03:24:58 PM
Old 07-19-2004
your question applies not only to SSH, but to every service built on the client/server model...ie almost all of them.

the server runs the service, the client connects to it.

your gonna have to search here, and on google for more info.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

SSH client

How can I use ssh client with proxy support? If possible: with proxy chain support. :) (2 Replies)
Discussion started by: zylwyz
2 Replies

2. Solaris

Secure FTP Problem using Sun SSH on Client system F-Secure on Server system

I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details: FTP Client has Sun SSH. FTP Server has F-Secure. I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies

3. UNIX for Advanced & Expert Users

difference between logging into unix through f-secure ssh client and telnet

hi, what is the difference between logging into unix through f-secure ssh client and telnet is there any more security check is involved can any one explain thanks in advance (1 Reply)
Discussion started by: trichyselva
1 Replies

4. UNIX for Dummies Questions & Answers

Is it possible for a server to be both a remote and client SSH host?

Hi, Not sure if this is possible, I have a server (SERVER1) that is currently set up as a remote SSH host. My client SSH host (SERVER2) is connecting to SERVER1 to scp a file with no password. I now have a need to set up a third server (SERVER3) as a remote SSH host and I need SERVER1 as a... (4 Replies)
Discussion started by: tatchel
4 Replies

5. Shell Programming and Scripting

Using ssh to add register key on ssh server

Hi, I want to use ssh to add a register key on remote ssh server. Since there are space characters in my register key string, it always failed. If there is no space characters in the string, it worked fine. The following is what I have tried. It seems that "ssh" command doesn't care about double... (9 Replies)
Discussion started by: leaftree
9 Replies

6. Solaris

SSH Client

Hi Gurus, I need an SSH client to connect to a Solaris server from windows and run a few scripts. I am able to put/pull files using "psftp" using below command: psftp -l <username> -pw <password> <hostname> -b <batchfile> However i am unable to find an equivalent for ssh. I tried... (3 Replies)
Discussion started by: Hari_Ganesh
3 Replies

7. Linux

What SSH Client do you Use?

Most of you probably use PuTTy, but I was wondering if there were any other good alternatives. So, what SSH client do you use? (2 Replies)
Discussion started by: erich76
2 Replies

8. IP Networking

Unable to SSH from Windows client to Ubuntu Server

I'm trying to setup a small home network environment as a pet project. These are physical machines nothing virtual. Any help or ideas is greatly appreciated. I can ping between both machines and I have Samba established and can read/write different shares. When I try to SSH from Windows 8.1... (10 Replies)
Discussion started by: lombardi4851
10 Replies

9. UNIX and Linux Applications

What is the difference between /etc/ssh/ and ~/.ssh?

Hi, I know the “/etc/ssh” directory is for the ssh daemon and the “~/.ssh” directory is for a particular user. Both directories contain private and public keys: (see the attachment) but what is the difference between those keys in both directories? I'm confused because the ones i use as a... (5 Replies)
Discussion started by: kavish11
5 Replies
SECSH(5)							    Lsh Manuals 							  SECSH(5)

NAME
secsh - the Secure Shell protocol DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH]. It has three major components: The Transport layer protocol This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User authentication protocol This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server. The Connection protocol This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels. IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist. The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]). The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License. REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998 [SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998 [SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998 [SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998 [SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995 TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd. AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. SEE ALSO
lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8) LSH
JANUARY 1999 SECSH(5)
All times are GMT -4. The time now is 01:37 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy