m.lev-yashin-1st-klub-union-dynamo-balon-1963-fc-s8.prestasi.web.id Layanan Informasi 17 Jam
Telp/Fax : 021-8762002, 8762003, 8762004, 87912360
HP/SMS : 081 1110 4824 27, 0812 9526 2009, 08523 1234 000
WhatsApp : 0817 0816 486, 0812 9526 2009
email : _Hubungi Kami__ silahkan klik
Chatting dengan Staf :
ggkarir.com
ggiklan.com
Pilih Bahasa :   ID   EN   Permintaan Katalog / Brosur (GRATIS via POS)   Ensiklopedia Lowongan Kerja Iklan

   
Cari  
    Ilmu Telekomunikasi

    Sebelumnya  (Open-source software) (OpenSSL)  Berikutnya    

OpenSSH

OpenSSH
OpenSSH logo.png
"Don't tell anyone that I'm free"
Developer(s)The OpenBSD Project
Stable release6.2 / March 22, 2013; 1 day ago (2013-03-22)
Development statusActive
Operating systemCross-platform
TypeRemote access
LicenseSimplified BSD License
Websitewww.openssh.com

OpenSSH (OpenBSD Secure Shell) is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol. It was created as an open source alternative to the proprietary Secure Shell software suite offered by SSH Communications Security.

OpenSSH is developed as part of the security conscious OpenBSD project, which is led by Theo de Raadt.[1] The project's development is funded via donations.

Contents

History

OpenSSH was created by the OpenBSD team as an alternative to the original SSH software by Tatu Ylönen, which is now proprietary software.[2] Although source code is available for the original SSH, various restrictions are imposed on its use and distribution. The OpenSSH developers claim that their application is more secure than the original, due to their policy of producing clean and audited code and because it is released under the BSD license, the open source license to which the word open in the name refers.

OpenSSH first appeared in OpenBSD 2.6 and the first portable release was made in October 1999.[3]

Release History:

  • OpenSSH 6.2: March 22, 2013
  • OpenSSH 6.1: August 29, 2012
  • OpenSSH 6.0: April 22, 2012
  • OpenSSH 5.9: September 6, 2011
  • OpenSSH 5.8: February 4, 2011
  • OpenSSH 5.7: January 24, 2011
  • OpenSSH 5.6: August 23, 2010
  • OpenSSH 5.5: April 16, 2010
  • OpenSSH 5.4: March 8, 2010
    • Disabled SSH protocol 1 default support. Clients and servers must now explicitly enable it.
    • Added PKCS11 authentication support for ssh(1) (-I pkcs11)
    • Added Certificate based authentication
    • Added "Netcat mode" for ssh(1) (-W host:port). Similar to "-L tunnel", but forwards instead stdin and stdout. This allows, for example, using ssh(1) itself as a ssh(1) ProxyCommand to route connections via intermediate servers, without the need for nc(1) on the server machine.
    • Added the ability to revoke public keys in sshd(8) and ssh(1). While it was already possible to remove the keys from authorised lists, revoked keys will now trigger a warning if used.
  • OpenSSH 5.3: October 1, 2009
  • OpenSSH 5.2: February 23, 2009
  • OpenSSH 5.1: July 21, 2008
  • OpenSSH 5.0: April 3, 2008
  • OpenSSH 4.9: March 30, 2008
    • Added chroot support for sshd(8)
  • OpenSSH 4.7: September 4, 2007
  • OpenSSH 4.6: March 9, 2007
  • OpenSSH 4.5: November 7, 2006
  • OpenSSH 4.4: September 27, 2006
  • OpenSSH 4.3: February 1, 2006
    • Added OSI layer 2/3 tun-based VPN (-w option on ssh(1))
  • OpenSSH 4.2: September 1, 2005
  • OpenSSH 4.1: May 26, 2005
  • OpenSSH 4.0: March 9, 2005
  • OpenSSH 3.9: August 17, 2004
  • OpenSSH 3.8: February 24, 2004
  • OpenSSH 3.7.1: September 16, 2003
  • OpenSSH 3.7: September 16, 2003
  • OpenSSH 3.6.1: April 1, 2003
  • OpenSSH 3.6: March 31, 2003
  • OpenSSH 3.5: October 14, 2002
  • OpenSSH 3.4: June 26, 2002

Development and structure

OpenSSH remotely controlling a server through Unix shell

OpenSSH is developed as part of the OpenBSD operating system. Rather than including changes for other operating systems directly into OpenSSH, a separate portability infrastructure is maintained by the OpenSSH Portability Team and "portable releases" are made periodically. This infrastructure is substantial, partly because OpenSSH is required to perform authentication, a capability that has many varying implementations. This model is also used for other OpenBSD projects such as OpenNTPD.

The OpenSSH suite includes the following tools:

  • ssh, a replacement for rlogin, rsh and telnet to allow shell access to a remote machine.
  • scp, a replacement for rcp.
  • sftp, a replacement for ftp to copy files between computers.
  • sshd, the SSH server daemon.
  • ssh-keygen a tool to inspect and generate the RSA, DSA and Elliptic Curve keys that are used for user and host authentication.
  • ssh-agent and ssh-add, utilities to ease authentication by holding keys ready and avoid the need to enter passphrases every time they are used.
  • ssh-keyscan, which scans a list of hosts and collects their public keys.

The OpenSSH server can authenticate users using the standard methods supported by the ssh protocol: with a password; public-key authentication, using per-user keys; host-based authentication, which is a secure version of rlogin's host trust relationships using public keys; keyboard-interactive, a generic challenge-response mechanism that is often used for simple password authentication but which can also make use of stronger authenticators such as tokens; and Kerberos/GSSAPI. The server makes use of authentication methods native to the host operating system; this can include using the BSD authentication system (bsd auth) or PAM to enable additional authentication through methods such as one time passwords. However, this occasionally has side-effects: when using PAM with OpenSSH it must be run as root, as root privileges are typically required to operate PAM. OpenSSH versions after 3.7 (September 16, 2003) allow PAM to be disabled at run-time, so regular users can run sshd instances.

Features

OpenSSH includes the ability to forward remote TCP ports over a secure tunnel. This is used to multiplex additional TCP connections over a single ssh connection, concealing connections and encrypting protocols which are otherwise unsecured, and for circumventing firewalls. An X Window System tunnel may be created automatically when using OpenSSH to connect to a remote host, and other protocols, such as HTTP and VNC, may be forwarded easily.

In addition, some third-party software includes support for tunnelling over SSH. These include DistCC, CVS, rsync, and Fetchmail. On some operating systems, remote file systems can be mounted over SSH using tools such as sshfs (using FUSE).

An ad hoc SOCKS proxy server may be created using OpenSSH. This allows more flexible proxying than is possible with ordinary port forwarding.

Beginning with version 4.3, OpenSSH implements an OSI layer 2/3 tun-based VPN. This is the most flexible of OpenSSH's tunnelling capabilities, allowing applications to transparently access remote network resources without modifications to make use of SOCKS.

Trademark

In February 2001, Tatu Ylönen, Chairman and CTO of SSH Communications Security informed the OpenSSH development mailing list, that after speaking with key OpenSSH developers Markus Friedl, Theo de Raadt, and Niels Provos, the company would be asserting its ownership of the "SSH" and "Secure Shell" trademarks. Ylönen commented that the trademark "is a significant asset ... SSH Communications Security has made a substantial investment in time and money in its SSH mark"[4] and sought to change references to the protocol to "SecSH" or "secsh", in order to maintain control of the "SSH" name. He proposed that OpenSSH change its name in order to avoid a lawsuit, a suggestion that developers resisted. OpenSSH developer Damien Miller replied that "SSH has been a generic term to describe the protocol well before your [Ylönen's] attempt to trademark it" and urged Ylönen to reconsider, commenting: "I think that the antipathy generated by pursuing a free software project will cost your company a lot more than a trademark."[5]

At the time, "SSH," "Secure Shell" and "ssh" had appeared in documents proposing the protocol as an open standard and it was hypothesised that by doing so, without marking these within the proposal as registered trademarks, Ylönen was relinquishing all exclusive rights to the name as a means of describing the protocol. Improper use of a trademark, or allowing others to use a trademark incorrectly, results in the trademark becoming a generic term, like Kleenex or Aspirin, which opens the mark to use by others.[6] After study of the USPTO trademark database, many online pundits opined that the term "ssh" was not trademarked, merely the logo using the lower case letters "ssh." In addition, the six years between the company's creation and the time when it began to defend its trademark, and that only OpenSSH was receiving threats of legal repercussions, weighed against the trademark's validity.[7]

Both developers of OpenSSH and Ylönen himself were members of the IETF working group developing the new standard; after several meetings this group denied Ylönen's request to rename the protocol, citing concerns that it would set a bad precedent for other trademark claims against the IETF. The participants argued that both "Secure Shell" and "SSH" were generic terms and could not be trademarks.[8]

Microsoft Windows support

Although there is no native Windows port of OpenSSH, there are several ways to access OpenSSH servers from Windows computers:

See also

References

Further reading

External links

    Sebelumnya  (Open-source software) (OpenSSL)  Berikutnya    


D3 KebidananD3 Analis KesehatanS1 Teknik SipilS1 Teknik SipilS1 Sistem InformasiS1 Pendidikan Bahasa dan Sastra IndonesiaS1 Ilmu PolitikPHP



Tags: OpenSSH, Ilmu Telekomunikasi, 2272, OpenSSH OpenSSH, Don't tell anyone that I'm free, Developer(s) The OpenBSD Project Stable release 6.2 / March 22 2013 ; day ago ( 2013 03 22 ) Development status Active Operating system Cross platform Type Remote access License Simplified BSD License Website www.openssh.com OpenSSH ( OpenBSD Secure Shell ) is a set of computer programs providing encrypted communication sessions over a, OpenSSH, Bahasa Indonesia, Contoh Instruksi, Tutorial, Referensi, Buku, Petunjuk m.lev yashin 1st klub union dynamo balon 1963 fc s8, prestasi.web.id
 Soal-Jawab Psikotes/TPA    Program Kuliah Gratis    Buku Referensi    Download Brosur    Bursa Karir    Kumpulan Pustaka Bebas    Program Perkuliahan Lanjutan

 Jadwal Ujian Try Out    Pendaftaran Online    Permintaan Beasiswa Kuliah    Berbagai Perdebatan    Semua Publikasi    Jadwal Sholat    Qur'an Online    Kuliah Shift    Program Perkuliahan Reguler Pagi/Siang    Program S2 (Pascasarjana)    Kuliah Hybrid di 112 PTS Terbaik
Manfaat Nangka

Merawat tumbuhan Savory, Kandungan zat gizi Sorrel, Menanam benih / biji Kacang Gude di sekitar rumah, dsb.

Infokan ke Rekan
Nama Anda

Email Anda

Email Rekan 1

Email Rekan 2 (tidak wajib)

Email Rekan 3 (tidak wajib)
♙ harus diisi dengan benar

PERMINTAAN KATALOG
(GRATIS via POS)
Nama Penerima Katalog

Alamat Lengkap

Kota + Provinsi

Kode Pos

Email (tidak wajib)

⛦ harus diisi lengkap & jelas
Atau kirimkan nama dan
alamat lengkap via SMS ke HP:
0811 1990 9026


Brosur Gratis
Brosur Kelas Karyawan
Gabungan Seluruh Wilayah Indonesia

pdf (11,2 MB)zip (8,8 MB)
Image/JPG (36,2 MB)
Brosur Kelas Karyawan
JABODETABEK

pdf (5,5 MB)zip (4,4 MB)
Image/JPG (13,2 MB)
Brosur Kelas Karyawan
DIY,JATENG,JATIM & BALI

pdf (4,4 MB)zip (3,5 MB)
Image/JPG (14,5 MB)
Brosur Kelas Karyawan
JAWA BARAT

pdf (2,8 MB)zip (2,2 MB)
Image/JPG (7,1 MB)
Brosur Kelas Karyawan
SULAWESI

pdf (1,9 MB)zip (1,5 MB)
Image/JPG (5,6 MB)
Brosur Kelas Karyawan
SUMATERA & BATAM

pdf (2,2 MB)zip (1,7 MB)
Image/JPG (6,5 MB)
Brosur Reguler
pdf (4,1 Mb)zip (8,4 Mb)
Soal UN & SBMPTN
pdf(3,5 Mb)zip(1,5 Mb)

Terobosan Baru
Strategi MENINGKATKAN
Kualitas Pendidikan, Sumber Daya dan Pendapatan PTS
Ikhtisar Terperinci
silakan klik di bawah ini
http://kpt.co.id

Lowongan Kerja

PT. Gilland Ganesha

Dibutuhkan Segera
  • Design Grafis
  • Tenaga Ahli Pemrograman

Rangkuman Menyeluruh di :
Kesempatan kerja

155 Jenis / Ras Kucing

Pengetahuan dasar kucing, arti warna kucing, jadwal vaksinasi kucing, dsb.

Facebook Kuliah Karyawan
Twitter Kuliah Karyawan

Tujuan Penting
silakan klik di bawah ini
Tempat Wisata di EROPA
Ensiklopedia Dunia
Film
Hewan
Jabodetabek
Manga
Musik
Sejarah

1. Universitas Yarsi Pratama - Universitas Yarsi Pratama - Kampus : Jl. Aria Jaya Santika No. 7, Pasir Nangka, Kec. Tigaraksa, Kab. Tangerang, Banten
2. STIE Widya Persada Jakarta - Sekolah Tinggi Ilmu Ekonomi Widya Persada Jakarta - Kampus :Jl. Hj. Tutty Alawiyah No.486, RW.5, Kalibata, Kec. Pancoran, Kota Jakarta Selatan, Daerah Khusus Ibukota Jakarta 12740
3. UWIKA Surabaya - Universitas Widya Kartika Surabaya - Kampus UWIKA : Jl. Sutorejo Prima Utara II No.1, Kalisari, Kec. Mulyorejo, Kota Surabaya, Jawa Timur 60112
4. Universitas Wijaya Kusuma Surabaya - Universitas Wijaya Kusuma Surabaya - Kampus : Jl. Dukuh Kupang XXV No.54, Dukuh Kupang, Kec. Dukuhpakis, Surabaya, Jawa Timur 60225
5. Universitas Teknologi Sulawesi Makassar - Universitas Teknologi Sulawesi Makassar - Kampus UTS Makassar : Jl. Talasalapang No.51A, Karunrung, Kec. Rappocini, Kota Makassar, Sulawesi Selatan 90222
6. Universitas Teknologi Nusantara - Universitas Teknologi Nusantara - Kampus UTN : Jl. Kedung Halang Pemda pangkalan II No.66, RT.01/RW.02, Kedunghalang, Kec. Bogor Utara, Kota Bogor, Jawa Barat 16158
ftui.web.id  |  kebangkitan-pendidikan-indonesia.co.id  |  roniabd.web.id  |  pelatihank3.web.id  |  trainingk3.web.id  |  infopts.com  |  mathematical-journal.org  |  s2-uwks.web.id