Secure Shell (SSH)

GPTKB entity

Statements (115)
Predicate Object
gptkbp:instance_of gptkb:XMPP_Extension_Protocol
gptkbp:agent gptkb:theorem
gptkbp:based_on gptkb:RFC_4251
gptkbp:can_be_used_with rsync
firewalls
SSH keys
scp
sftp
VP Ns
SSH agents
SSH config files
gptkbp:communication gptkb:theorem
gptkbp:data_privacy gptkb:theorem
gptkbp:default_web_browser gptkb:Bitvise_SSH_Server
gptkb:Open_SSH_Server
gptkb:Dropbear_SSH
gptkbp:developed_by gptkb:Tatu_Ylönen
gptkb:IETF
gptkbp:direct_xsupport gptkb:theorem
gptkbp:enforces gptkb:theorem
gptkbp:first_released gptkb:1995
gptkbp:has_version gptkb:SSH-1
gptkb:SSH-2
gptkbp:home_port gptkb:22
gptkb:theorem
https://www.w3.org/2000/01/rdf-schema#label Secure Shell (SSH)
gptkbp:is_compatible_with gptkb:smartphone
gptkb:operating_system
Unix-like operating systems
gptkbp:is_implemented_in gptkb:Tectia_SSH
gptkb:Pu_TTY
gptkb:Win_SCP
gptkb:chess_match
various programming languages
gptkbp:is_often_used_in gptkb:software
gptkb:software_framework
gptkb:Cloud_Computing_Service
system administration
network management
gptkbp:is_part_of gptkb:SSH_protocol_suite
gptkb:XMPP_Extension_Protocol
gptkb:SSH-1
gptkb:SSH-2
gptkb:chess_match
secure communications
cloud computing security
secure network architecture
Dev Ops practices
gptkbp:is_related_to gptkb:DJ
gptkb:SFTP
TLS
VPN
gptkbp:is_standardized_by IETFRF Cs
IETFRFC 4251
IETFRFC 4252
IETFRFC 4253
IETFRFC 4254
gptkbp:is_supported_by gptkb:smartphone
gptkb:theorem
gptkb:server
Cisco devices
most operating systems
most Linux distributions
gptkbp:is_used_by gptkb:software
system administrators
network engineers
gptkbp:is_used_for secure data transfer
tunneling
secure file transfer
secure application access
remote command execution
remote desktop access
remote server management
secure backups
secure remote login
secure network services
gptkbp:is_vulnerable_to man-in-the-middle attacks
brute force attacks
credential theft
gptkbp:library gptkb:Pu_TTY
gptkb:Open_SSH_Client
Bitvise SSH Client
gptkbp:operates TCP port 22
gptkbp:primary_source secure remote login
gptkbp:provides secure file transfer
secure command execution
gptkbp:provides_access_to gptkb:theorem
password authentication
public key authentication
keyboard-interactive authentication
gptkbp:security_features confidentiality
data integrity
asymmetric encryption
authentication
hashing algorithms
key management
man-in-the-middle attacks
symmetric encryption
hash functions
eavesdropping
IP spoofing
Telnet
public key authentication
ftp
session hijacking
host verification
session encryption
rlogin
gptkbp:supports port forwarding
X11 forwarding
password authentication
public key authentication
gptkbp:bfsParent gptkb:DJ
gptkb:chess_match
gptkbp:bfsLayer 3