The SSH protocol allows any client and server programs built to
the protocol's specifications to communicate securely and to be
used interchangeably.
Two varieties of SSH (version 1 and version 2) currently exist.
SSH version 1 makes use of several patented encryption algorithms
(however, some of these patents have expired) and is vulnerable to
a well known security exploit that allows an attacker to insert
data into the communication stream. The OpenSSH suite under Red Hat
Enterprise Linux uses SSH version 2 which has an enhanced key
exchange algorithm not vulnerable to the exploit in version 1.
However, the OpenSSH suite does support version 1 connections.
|
Important |
|
It is recommended that only SSH version 2-compatible servers and
clients are used whenever possible.
|