Index of /public/security/ssh

      Name                   Last modified     Size  Description

[DIR] Parent Directory 19-Dec-96 12:47 - [DIR] contrib/ 19-Dec-96 12:47 - [DIR] old/ 19-Dec-96 12:47 - [DIR] os2/ 19-Dec-96 12:47 - [DIR] snapshots/ 19-Dec-96 12:47 - [CMP] ssh-1.2.13.tar.gz 11-Feb-96 19:55 562k [   ] ssh-1.2.13.tar.gz.sig 11-Feb-96 19:55 1k [CMP] ssh-1.2.14.tar.gz 12-Jul-96 18:34 573k [   ] ssh-1.2.14.tar.gz.sig 12-Jul-96 18:34 1k [CMP] ssh-1.2.16.tar.gz 04-Oct-96 15:18 885k [   ] ssh-1.2.16.tar.gz.sig 04-Oct-96 15:18 1k [CMP] ssh-1.2.17.tar.gz 30-Oct-96 04:29 905k [   ] ssh-1.2.17.tar.gz.sig 30-Oct-96 04:41 1k [CMP] ssh-osf1-c2-setluid-p..24-Apr-96 15:33 15k [CMP] ssh-osf1-c2-setluid-p..24-Apr-96 15:34 1k [DIR] windows/ 19-Dec-96 12:47 -

SSH (Secure Shell) Version 1.2


Ssh (Secure Shell) is a program to securely log into another computer
over an insecure network, to execute commands in a remote machine, and
to move files from one machine to another.  Its features include the
following:

   o    Strong authentication.  Closes several security holes (e.g., IP,
	routing, and DNS spoofing and listening for passwords from the
	network).  New authentication methods: .rhosts together with
	RSA based host authentication, and pure RSA authentication.

   o    All communications are automatically and transparently
        encrypted.  Encryption is also used to protect against spoofed
        packets.

   o    X11 connection forwarding provides secure X11 sessions.
   	Automatically sets DISPLAY on remote host.

   o    Arbitrary TCP/IP ports can be redirected over the encrypted
        channel in both directions.

   o    Client RSA-authenticates the server machine in the beginning of
        every connection to prevent trojan horses (by routing or DNS
        spoofing) and man-in-the-middle attacks, and the server RSA-
        authenticates the client machine before accepting .rhosts or
        /etc/hosts.equiv authentication (to prevent DNS, routing, or IP
        spoofing).

   o    An authentication agent, running in the user's local workstation
        or laptop, can be used to hold the user's RSA authentication
        keys.

   o    Multiple convenience features fix annoying problems with rlogin
        and rsh (such as returning correct exit status and running
	remote commands on a tty).

   o    Complete replacement for rlogin, rsh, and rcp.

Version 1.2 fixes many problems and adds new features.  This
version has been tested by many people and should be quite stable.


Ssh is freely available, and may be used by anyone (see the file
COPYING in the distribution for more details).  There is no warranty
of any kind, and patents may restrict your right to use this software
in some countries.

There is a mailing list for ssh.  Send mail to ssh-request@clinet.fi
to get instructions (or mail directly to majordomo@clinet.fi with
"subscribe ssh" in body).

The Ssh Home Page http://www.cs.hut.fi/ssh contains more information
about the software, mailing lists, and archives.

All official distributions of ssh are accompanied by a pgp signature
by the key "pub 1024/DCB9AE01 1995/04/24 Ssh distribution key
<ylo@cs.hut.fi>".  (Included below, and available from the key
servers.)

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.i

mQCNAi+btRkAAAEEAKxQ9HwqfsQc9apOIQmFTo2wqbCL6Q1xlvN6CjxkBbtviaLq
EgmVPnb/FGD5wwxDMjCCJDwBFfLLRwASQAyyy5RjukkZx1Gn8qHzmoyIOVTFOIJI
TFDWyVjMSSvUKACDqXv/xVFunsPlPc7d6f4MwxD1kw2BBpoV7k64di/cua4BAAUR
tCRTc2ggZGlzdHJpYnV0aW9uIGtleSA8eWxvQGNzLmh1dC5maT6JAJUCBRAvm7Vv
qRnF8ZYfSjUBAW7pBACQ7G2pYStkBM5aOK2udb/m/YAAZ/NlY2emSgEJfYrAysSY
0yfbhKGt0K59fGSotmSRcMOpq0tgTMm7lQjsUr5ez1Ra/0Dv7e3xoGQYJ8764X9w
popC+u9JuxLeGTtgWYwPUZIHFcQanZslUmCDr36kvesx/2wXBf8+StghMbA3vw==
=aGik
-----END PGP PUBLIC KEY BLOCK-----