lotus

previous page: 2.1. What is ssh?
  
page up: SSH - Secure Shell FAQ
  
next page: 2.3. What kinds of attacks does ssh protect against?

2.2. Why should I use it? (SSH (Secure Shell))




Description

This article is from the SSH - Secure Shell FAQ, by Thomas Koenig Thomas.Koenig@ciw.uni-karlsruhe.de with numerous contributions by others.

2.2. Why should I use it? (SSH (Secure Shell))

The traditional BSD 'r' - commmands (rsh, rlogin, rcp) are vulnerable
to different kinds of attacks. Somebody who has root access to
machines on the network, or physical access to the wire, can gain
unauthorized access to systems in a variety of ways. It is also
possible for such a person to log all the traffic to and from your
system, including passwords (which ssh never sends in the clear).

The X Window System also has a number of severe vulnerabilities. With
ssh, you can create secure remote X sessions which are transparent to
the user. As a side effect, using remote X clients with ssh is more
convenient for users.

Users can continue to use old .rhosts and /etc/hosts.equiv files;
changing over to ssh is mostly transparent for them. If a remote site
does not support ssh, a fallback mechanism to rsh is included.

 

Continue to:













TOP
previous page: 2.1. What is ssh?
  
page up: SSH - Secure Shell FAQ
  
next page: 2.3. What kinds of attacks does ssh protect against?