SSH protocol suite

GPTKB entity

Statements (49)
Predicate Object
gptkbp:instance_of gptkb:protocol
gptkbp:can_be_extended_by tunneling protocols
SSH agent forwarding
SSH key management
gptkbp:can_be_used_with gptkb:SFTP
gptkb:SCP-963
X11 forwarding
gptkbp:designed_for secure communication
gptkbp:developed_by gptkb:Tatu_Ylönen
gptkbp:first_released gptkb:1995
https://www.w3.org/2000/01/rdf-schema#label SSH protocol suite
gptkbp:includes gptkb:SSH-1
gptkb:SSH-2
gptkbp:is_based_on client-server architecture
gptkbp:is_compatible_with various operating systems
gptkbp:is_implemented_in gptkb:Bitvise_SSH_Server
gptkb:Pu_TTY
gptkb:Win_SCP
gptkb:Dropbear_SSH
gptkb:Open_SSH
gptkbp:is_often_used_in network administration
secure shell access
secure file transfers
gptkbp:is_part_of network security protocols
secure communication protocols
remote access protocols
gptkbp:is_popular_in container orchestration
cloud computing environments
Dev Ops practices
gptkbp:is_standardized_by gptkb:IETF_RFC_4251
gptkb:IETF_RFC_4252
gptkb:IETF_RFC_4253
gptkb:IETF_RFC_4254
gptkbp:is_used_by gptkb:developers
IT professionals
system administrators
gptkbp:provides secure channel over an unsecured network
gptkbp:provides_authentication user authentication
gptkbp:provides_confidentiality data confidentiality
gptkbp:provides_integrity message integrity
gptkbp:security man-in-the-middle attacks
symmetric encryption
eavesdropping
session hijacking
gptkbp:supports secure file transfer
remote command execution
gptkbp:uses_authentication public key authentication
gptkbp:bfsParent gptkb:SFTP
gptkbp:bfsLayer 5