gptkbp:instance_of
|
gptkb:XMPP_Extension_Protocol
|
gptkbp:communication
|
gptkb:XMPP_Extension_Protocol
gptkb:battle
Password authentication
Public key authentication
Host-based authentication
|
gptkbp:compression_ratio
|
gptkb:battle
|
gptkbp:developed_by
|
gptkb:Tatu_Ylönen
|
gptkbp:first_published
|
gptkb:2006
|
gptkbp:home_port
|
gptkb:22
gptkb:battle
|
https://www.w3.org/2000/01/rdf-schema#label
|
SSH-1
|
gptkbp:is_adopted_by
|
System administrators
|
gptkbp:is_compatible_with
|
Cross-platform
|
gptkbp:is_standardized_by
|
Not standardized
|
gptkbp:is_used_by
|
gptkb:battle
|
gptkbp:is_vulnerable_to
|
Lack of integrity checking
Susceptible to man-in-the-middle attacks
Weak key exchange
|
gptkbp:key
|
gptkb:Diffie-Hellman
|
gptkbp:next_edition
|
1.0
|
gptkbp:partnership
|
Application layer protocol
|
gptkbp:primary_source
|
Secure remote login
|
gptkbp:purpose
|
Secure remote administration
|
gptkbp:related_to
|
gptkb:Secure_Sockets_Layer_(SSL)
gptkb:public_transportation_system
|
gptkbp:release_date
|
gptkb:1995
|
gptkbp:replaced_by
|
gptkb:battle
gptkb:SSH-2
|
gptkbp:security_features
|
gptkb:Blowfish
gptkb:battle
Authentication
Confidentiality
Data integrity
Symmetric encryption
Public key authentication
3 DES
R C4
|
gptkbp:streaming_platforms
|
gptkb:battle
|
gptkbp:successor
|
gptkb:SSH-2
|
gptkbp:technique
|
gptkb:Bitvise_SSH_Server
gptkb:Cygwin_SSH
gptkb:Moba_Xterm
gptkb:Secure_CRT
gptkb:Tectia_SSH
gptkb:Pu_TTY
gptkb:Win_SCP
gptkb:chess_match
|
gptkbp:use_case
|
Remote command execution
|
gptkbp:bfsParent
|
gptkb:chess_match
|
gptkbp:bfsLayer
|
3
|