A Suggested Improvement to SSHv2

February 2000
Jonathan C. Herzog, The MITRE Corporation
Download PDF (94.27 KB)

The SSH (Secure SHell) protocol has become one of many de-facto Internet standards for secure log-on and other network services across an insecure connection. It is commonly used to secure connections such as telnet or rsh, for secure file transfers (via the scp command), as a secure tunnel for other connections such as http or X, or as a VPN component.


Publication Search