Telnet.SSH (SSH1 and SSH2) the difference between

2010-03-08  来源:本站原创  分类:OS  人气:225 

In short: Telent is transmitted codes, SSH is encrypted transfer.

Use Telnet to access a remote computer that is used to TCP / IP protocol to control your network devices from a building when the equivalent of shouting in your user name and password. Soon someone will be listening, and they will make use of your lack of safety awareness. The traditional network service programs such as: ftp, pop, and telnet is insecure in nature, because they Chuansong the network clear text passwords and data, with ulterior motives are very easy to intercept the passwords and data. Moreover, these security authentication service program also has its weaknesses, is vulnerable to a "middleman" (man-in-the-middle) attacks in this way. The so-called "middleman" in the attack, is the "middleman" posing as the real server receives the data you passed to the server, and then pretending to pass your data to the real server. Server and data transfer between your being a "middleman", after a rigged changed hands, there will be a very serious problem.

SSH is an alternative Telnet and other remote console management applications, industry standards. SSH commands are encrypted and kept confidential in several ways. SSH has many functions, It can replace telnet, it can be ftp, pop, or even to provide a safe ppp "channel." SSH (Secure SHell) So far there are two incompatible versions - SSH1 and SSH2.

SSH1 is divided into two versions 1.3 and 1.5. SSH1 using DES, 3DES, Blowfish, and RC4 symmetric encryption algorithm such as protection of data security transmission, while the symmetric key encryption algorithm is non-symmetric encryption algorithm by (RSA) to complete the exchange. SSH1 using cyclic redundancy check code (CRC) to ensure data integrity, but this method was found to be defective.

SSH2 RSA avoid patent issues, and fix the CRC of the defect. SSH2 with the Digital Signature Algorithm (DSA) and Diffie-Hellman (DH) algorithm instead of RSA to complete the exchange of symmetric keys, confirm with the message code (HMAC) to replace the CRC. SSH2 also increased the AES and Twofish encryption algorithms such as symmetric.

相关文章
  • Telnet.SSH (SSH1 and SSH2) the difference between 2010-03-08

    In short: Telent is transmitted codes, SSH is encrypted transfer. Use Telnet to access a remote computer that is used to TCP / IP protocol to control your network devices from a building when the equivalent of shouting in your user name and password.

  • PuTTY: free Telnet / SSH Client 2010-07-30

    PuTTY: free Telnet / SSH Client PuTTY is a free cross-platform Telnet / SSH client, while in Win32 and Unix systems simulation xterm terminal. The main author is Simon Tatham . The current version 0.60 beta, please visit the PuTTY web site for more i

  • Common sense interpretation of ConnectBot-1 telnet.ssh 2011-01-01

    The default telnet port 23 ssh default port 22 Telnet: Tcp / IP terminal emulation protocol (TCP / IP Terminal Emulation Protocol): By setting up a server and client TCP connection between. After connecting, TELNET server and client access consultati

  • Telnet.ssh services under Linux configuration and use of 2011-08-05

    Transfer: http://hi.baidu.com/jon028/blog/item/9292035146d70510377abe05.html/cmtid/99101a012746870c1d958387 Telnet service configuration steps are as follows: First, install telnet package (usually two). 1, telnet-client (or telnet), this package pro

  • secureCRT vmware virtual machine can not Telnet SSH 2011-05-26

    In VMware uploaded centos5.5, the results can not be secureCRT remote landing. Choose to install the network connection mode for the bridge, and closed the linux selinux kernel protection mechanisms. Thought it was beginning to set their own question

  • SSH1还是SSH2与Annotation还是Xml配置的问题 2012-11-20

    这个问题是没有绝对的优点和缺点的. 有人喜欢说:我就爱用SSH2,因为都是最新的,我也喜欢用全annotation的方式来编程,因为这样做比较潮流,比较优雅.但是......这些都不是真正的justification. 对于在框架选型时,不仅仅是开发者自己喜欢不喜欢的问题,就和有人说:开发者们永远喜欢推倒重做,永远喜欢开发新项目而对于修修改改维护类项目感冒是一个道理. 试想,大部分的金融保险客户,他们的系统都是有一定的年头了,而且像这样的企业中的一个IT项目是不可能跟着潮流经常去变化的,因为这些

  • SecureCRT telnet tool 2011-03-06

    Basic Definitions SecureCRT is a support for SSH (SSH1 and SSH2) terminal emulation program, supports Telnet and rlogin protocols. SecureCRT is a run for the connection including Windows, UNIX and VMS ideal for the remote system. By using the include

  • CentOS 5.3 install Apache + php + Mysql + phpMyAdmin 2010-10-11

    1, the system downloads CentOS development community has released a new 5.3 version. CentOS 5.3 based on Red Hat Enterpris Linux 5.3.0, which includes Kernel 2.6.18, Apache 2.2, PHP 5.1.6, MySQL 5.0, PostgreSQL 8, GNOME 2.16, KDE 3.5, OpenOffice.org

  • Notes linux experience 2011-05-16

    yum For example: for example downloads a package is not signed, it can be installed 1. Yum - nogpgcheck install package name Copy code I generally used the first su to root, then yum. Many Internet users under the direct re-use of common usage of yum

  • The basic operation command 2011-04-12

    I. Terminal Tools: SecureCRT-v6.58H SecureCRT is a support for SSH (SSH1 and SSH2) terminal emulation program, supports Telnet and rlogin protocols. SecureCRT is a run for the connection including Windows, UNIX and VMS ideal for the remote system. By

  • experience with linux notes 2011-05-16

    yum For example: for example downloads a package is not signed, it can be installed 1. Yum - nogpgcheck install package name Copy code I generally used the first su to root, then yum. Many Internet users under the direct re-use yum normal usage, this

  • On the telnet and ssh 2011-08-18

    Last login host, it often ran telnet connection closed but you can connect to ssh, ssh connection closed but you can telnet to connect to today, spent some time the similarities and differences between them were compared finishing point, summarized a

  • putty实现自动登录的方法(ssh和ssh2) 2014-07-26

    这篇文章主要介绍putty实现自动登录的方法,需要的朋友可以参考下 1.登录主机并输入ssh-keygen -t rsa 提示Enter file in which to save the key (/root/.ssh/id_rsa): 输入/root/.ssh/sea_rsa 根据提示输入相关路径名和文件名并生成两个文件(之后的两个选项直接回车) 2.把那个没有.pub的文件copy出来用puttygen转换一下生成windows下putty可用的key(这里指sea_rsa,选择putty

  • Linux system using SSH remote control security 2010-12-15

    Network is attacked, in many cases provides a Telnet service because the server is caused. Indeed, for UNIX systems, if you want to remotely manage it, we must use the remote terminals, and to use the remote terminal is natural to start the Telnet se

  • How to use Putty remote (SSH) management Linux VPS 2010-06-17

    Putty is a free, Windows 32 platform for telnet, rlogin, and ssh client, but the function in no way inferior to the telnet class business tools. Use it to remotely manage Linux VPS is very easy to use, its main advantages are as follows: ◆ completely

  • linux ssh配置 2013-07-09

    SSH服务和Telnet服务一样,通过远程登录登录到系统,在远程操控系统.但它与Telnet的不同点就是:Telnet在传输的过程中是平文传输,而SSH是将传输内容加密,在传送的过程中保证了传送内容的保密性,从而提高了系统的安全性. 在这里,我们不准备将SSH服务作为用户上传下载文件的工具,前面已经讲过ftp的文章vsftpd配置 .我们只用SSH服务的开通为远程管理系统提供方便.另外在用户认证方式上,为了服务器和用户的安全,禁止用户密码的认证方式,而基于"钥匙"的方式. CentOS

  • CentOS SSH安装和配置(putty使用密钥进行连接) 2013-08-18

    SSH 为 Secure Shell 的缩写,由 IETF 的网络工作小组(Network Working Group)所制定:SSH 为建立在应用层和传输层基础上的安全协议. 传统的网络服务程序,如FTP.POP和Telnet其本质上都是不安全的:因为它们在网络上用明文传送数据.用户帐号和用户口令,很容易受到中间人(man-in-the-middle)攻击方式的攻击.就是存在另一个人或者一台机器冒充真正的服务器接收用户传给服务器的数据,然后再冒充用户把数据传给真正的服务器. 而 SSH 是目前

  • SSH使用指南 2014-07-14

    什么是SSH? 传统的网络服务程序,如:ftp.pop和telnet在本质上都是不安全的,因为它们在网络上用明文传送口令和数据,别有用心的人非常容易就可以截获这些口令和数据.而且,这些服务程序的安全验证方式也是有其弱点的,就是很容易受到"中间人"(man-in-the-middle)这种方式的攻击.所谓"中间人"的攻击方式,就是"中间人"冒充真正的服务器接收你的传给服务器的数据,然后再冒充你把数据传给真正的服务器.服务器和你之间的数据传送被&qu

  • Passwordless SSH logins 2010-08-11

    Passwordless SSH logins http://www.cs.utah.edu/ ~ bigler / code / sshkeys.html There are a few cases where having passwordless access to a machine is convenient or necessary. I'm always looking up a series of commands that I can just copy and paste t

  • Linux server using SSH command 2011-02-24

    Linux server remote maintenance while ago, using SSH, the legendary secure shell. Log: ssh [hostname]-u user Password :***** After landing you can control your machine as the same control it, but there is no visual interface. But now I have used two