{"draft":"draft-ietf-secsh-architecture-22","doc_id":"RFC4251","title":"The Secure Shell (SSH) Protocol Architecture","authors":["T. Ylonen","C. Lonvick, Ed."],"format":["ASCII","HTML"],"page_count":"30","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Secure Shell","abstract":"The Secure Shell (SSH) Protocol is a protocol for secure remote login\r\nand other secure network services over an insecure network. This\r\ndocument describes the architecture of the SSH protocol, as well as\r\nthe notation and terminology used in SSH protocol documents. It also\r\ndiscusses the SSH algorithm naming system that allows local extensions. The SSH\r\nprotocol consists of three major components: The Transport Layer\r\nProtocol provides server authentication, confidentiality, and\r\nintegrity with perfect forward secrecy. The User Authentication\r\nProtocol authenticates the client to the server. The Connection\r\nProtocol multiplexes the encrypted tunnel into several logical\r\nchannels. Details of these protocols are described in separate\r\ndocuments. [STANDARDS-TRACK]","pub_date":"December 2005","keywords":["remote login","ssh algorithm"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":["RFC8308","RFC9141"],"see_also":[],"doi":"10.17487\/RFC4251","errata_url":null}