SSH stands of Secure Shell hosting. SSH provides a safe and secure encrypted
mechanism to login to the system and transport the files. It works like a secure
replacement for FTP (File Transfer Protocol). Once you have created the website
pages, you have to upload the files to the server from the computer and here,
you will need a safe file transfer medium.
Internet is great source to gain and exchange information. Its open architecture allow user to get information at rapid pace. Irrespective of the huge usage and exposure to vast numbers of users, Internet is designed to be stable. Undoubtedly, the openness of the Internet makes it useful and user friendly, but it also subjects it to malicious attack. Some of the very common attacks are stealing passwords or sensitive information, taking over messages to know and change the broadcast data or use of fake network addresses to the full access control mechanism. It can also redirect connections to a fake server. SSH can protect the server and website from all aforesaid attacks and problems.
There are two
main fundamental component needed to transfer the files through SSH and SFTP-
server validation and client authentication. Both components uses public and
private keys to establish authenticate communication between the server and the
user. For a completely secure communication, SSH compare the public keys of the
server with the public keys saved on the client machine. The public key of
server contains a file called "known hosts" which is located on the server where
as the public of the client is stored in an encrypted file stored on the local
SSH authenticate a client by following ways-
- By providing user name and password
- Private key and passphrase
- Keyboard interactive authentication
To provide username and password authentication, you have to set up a user account on the SFTP server. The public key of the client is then added to the authorized keys files of the server with the helps of private key and passphrase authentication process. Once the sever validation is done, the user should enter their passphrase to load their private key and accomplish the authentication process.
Under the method of Keyboard- interactive authentication, the sever ask the client a series of question and the client should answer such questions correctly to be genuine. Generally, most of the SSH service provide option of file compression to the client. With the help of this option, data transferred by the server is compressed before sending. The client will decompress the data again at his end. It allows a speedy file transfers, especially, when you have low bandwidth connections.
Share this page with your friends