SSH Secure Shell Home Page, Maintained By SSH Protocol Inventor ...

  • About us
  • Investors
  • Partners
  • Careers
Request demo
  • Solutions
    • SOLUTIONS
      • Zero Trust Suite
      • Quantum-Safe Cryptography (QSC)
      • SalaX Secure Collaboration
      • Security Risk Assessment, Quantification & Mitigation
    • By Topic
      • Just-in-Time Access
      • Secure vendor access
      • Credentials & Secrets Management
      • Hybrid & multi-cloud access management
      • Interactive tour: Privileged Access in the Cloud
      • M2M connections
      • IT Audits & Compliance
      • Secure file transfer
    • By Industry
      • Managed Service Providers (MSP)
      • Operational Technology (OT)
      • Federal Government Security
  • Products
    • SECURE ACCESS & SECRETS MANAGEMENT
    • SECURE FILE TRANSFER & ENCRYPTION
      • NQX™ quantum-ready encryption
      • Tectia™ SSH Client/Server
      • Tectia™ z/OS
    • SalaX Secure Collaboration
      • Secure Mail 2024
      • Secure Messaging 2024
      • SalaX Secure Collaboration
Request demo
  • Solutions
    • SOLUTIONS
      • PrivX Zero Trust Suite
      • SalaX Secure Collaboration
      • Strong ID-based access with Entra ID & Zero Trust Suite
      • Quantum-Safe Cryptography (QSC)
      • Security Risk Assessment, Quantification & Mitigation
      • Device trust & access and identity verification
      • Identity-based authentication & converged IAM and PAM
    • TOPICS
      • Just-in-Time Access
      • Secure vendor access
      • Credentials & Secrets Management
      • Hybrid & Multi-Cloud Access Management
      • Interactive tour: Privileged Access in the Cloud
      • M2M Connections Management
      • IT Audits & Compliance
      • Secure File Transfer
    • INDUSTRIES
      • Managed Service Providers (MSP)
      • Operational Technology (OT)
      • Federal Government Security
      • Healthcare Data Security
  • OT Security
    • IT/OT convergence of data & systems
    • Zero Trust Access and ZSP
    • Workflow approvals
    • Secure remote access 
    • Secure patch management 
    • OT Compliance
    • Discovery and threat intelligence
    • Phishing-resistant MFA & device trust
  • Products
    • SalaX SECURE COLLABORATION
      • Secure Mail
      • Secure Messaging
      • Secure Sign
      • SalaX Secure Collaboration
      • FQX File Encryptor
    • SECURE ACCESS & SECRETS MANAGEMENT
      • PrivX™ PAM3
      • PrivX™ OT Edition
      • PrivX Key Manager
    • SECURE FILE TRANSFER & ENCRYPTION
      • Tectia™ SSH Client/Server
      • Tectia™ SSH Server for IBM z/OS
      • NQX™ quantum-safe encryption
  • Services
    • SSH Risk Assessment™
    • Professional Services
    • Support
    • Contact us
  • Customer cases
    • PrivX Zero Trust PAM
    • Enterprise Key Management UKM
    • Tectia SFTP for servers & mainframes
    • SSH Secure Collaboration
  • Resources
    • SSH Academy
    • Content library
    • Blog
    • References
    • Press releases
    • Downloads
    • Manuals
    • Events & Webinars
    • Media
    • Legal
    • Report a vulnerability
  • Solutions
    • SOLUTIONS
      • PrivX Zero Trust Suite
      • SalaX Secure Collaboration
      • Strong ID-based access with Entra ID & Zero Trust Suite
      • Quantum-Safe Cryptography (QSC)
      • Security Risk Assessment, Quantification & Mitigation
      • Device trust & access and identity verification
      • Identity-based authentication & converged IAM and PAM
    • TOPICS
      • Just-in-Time Access
      • Secure vendor access
      • Credentials & Secrets Management
      • Hybrid & Multi-Cloud Access Management
      • Interactive tour: Privileged Access in the Cloud
      • M2M Connections Management
      • IT Audits & Compliance
      • Secure File Transfer
    • INDUSTRIES
      • Managed Service Providers (MSP)
      • Operational Technology (OT)
      • Federal Government Security
      • Healthcare Data Security
  • OT Security
    • IT/OT convergence of data & systems
    • Zero Trust Access and ZSP
    • Workflow approvals
    • Secure remote access 
    • Secure patch management 
    • OT Compliance
    • Discovery and threat intelligence
    • Phishing-resistant MFA & device trust
  • Products
    • SalaX SECURE COLLABORATION
      • Secure Mail
      • Secure Messaging
      • Secure Sign
      • SalaX Secure Collaboration
      • FQX File Encryptor
    • SECURE ACCESS & SECRETS MANAGEMENT
      • PrivX™ PAM3
      • PrivX™ OT Edition
      • PrivX Key Manager
    • SECURE FILE TRANSFER & ENCRYPTION
      • Tectia™ SSH Client/Server
      • Tectia™ SSH Server for IBM z/OS
      • NQX™ quantum-safe encryption
  • Services
    • SSH Risk Assessment™
    • Professional Services
    • Support
    • Contact us
  • Customer cases
    • PrivX Zero Trust PAM
    • Enterprise Key Management UKM
    • Tectia SFTP for servers & mainframes
    • SSH Secure Collaboration
  • Resources
    • SSH Academy
    • Content library
    • Blog
    • References
    • Press releases
    • Downloads
    • Manuals
    • Events & Webinars
    • Media
    • Legal
    • Report a vulnerability
  • About us
  • Investors
  • Partners
  • Careers
Request demo

SSH Academy

  • Cloud
    • Cloud Access Management
    • Cloud Applications
    • Cloud Computing
    • Cloud Computing Models
    • Cloud Computing Pros and Cons
    • Cloud Computing Security
    • Cloud Computing Services: Characteristics
    • Cloud Infrastructure Entitlement Management (CIEM)
    • Cloud Security Buyer's Guide
    • Cloud Security Maturity Model
    • Cloud Service Providers
    • IaaS
    • Immutable Infrastructure in Modern IT
    • PaaS
    • SaaS
    • Virtualization Technology
  • Compliance
    • Cybersecurity Compliance
    • Basics of SSH Compliance
    • Basics of SSH Key Compliance
    • Basel III
    • Digital Operational Resilience Act (DORA)
    • Ensuring ISO 27001 with PAM
    • Fips 200
    • GDPR
    • HIPAA
    • ISACA
    • ISO 27001
    • NIS Directive
    • A Guide to NIS2 Directive
    • NIST Cybersecurity Framework
    • NIST 2.0 Cybersecurity Framework
    • NIST 7966
    • NIST 800-53
    • PCI-DSS
    • Sans Top 20
    • Sarbanes Oxley
    • Understanding PAM Standards
  • Cryptography
    • Cryptography Explained
    • Cryptography and the Quantum Threat
    • Encryption Key Management
    • Private & Public Keys
    • Quantum Computing & Post-Quantum Algorithms
    • What is File Encryption?
  • Identity and Access Management (IAM)
    • What is Identity and Access Management (IAM)?
    • What is IAM Zero Trust Framework?
    • What is Zero Trust Network Access (ZTNA)?
    • A Guide to Zero Trust Architecture
    • Active Directory
    • Entra ID by Microsoft
    • Ephemeral Certificates & Ephemeral Access
    • Gartner CARTA
    • How PAM Complements Existing IAM
    • IAM vs PAM
    • Identity Governance and Administration (IGA)
    • Identity Management
    • Jump Server
    • Just-in-Time Access
    • Just-in-Time Security Tokens
    • Key IAM Concepts for IT Professionals
    • Multi-Factor Authentication (MFA)
    • OpenID Connect (OIDC)
    • Privileged Identity Management (PIM)
    • Radius
    • Sudo
    • User Account Types
    • User IDs
    • Unified IAM-PAM solution
  • Internet of Things (IoT)
    • IoT Security
    • IoT: Accessing IoT devices for SSH
    • What is IIoT?
  • Operational Technology
    • What is OT Security?
    • Best OT Security Solutions
    • Best Practices for Secure Remote OT Access
    • Critical Infrastructure Cybersecurity: Key Concepts Explained
    • How to Safeguard Your OT Network Without Separate IT/OT Solutions
    • How to Secure IoT and OT Systems: A Practical Guide
    • ICS OT Security
    • Industrial Automation Cybersecurity: Key Considerations and Risks
    • IT vs OT
    • Navigating OT Security Standards
    • OT, ICS, SCADA explained
    • OT Risk Management: What It Is and Why You Need It
    • OT Security Assessment
    • OT Security Best Practices
    • OT Security Essentials
    • OT Governance: Key Principles for Effective Implementation
    • PAM and IACS Integration
    • PAM & IEC 62443 Access Control Standards
    • PAM for Energy Sector
    • PAM for Manufacturing
    • PrivX for Energy Sector
    • PrivX for Forestry Industry
    • Remote Diagnostics for Ships
    • Remote Maintenance of Pulp&Paper Machines
    • SCADA Security Essentials: Your Need-to-Know Guide
    • What Is OT Monitoring and Why Is It Important?
    • What is the IT/OT Convergence?
    • Why Is Zero Trust Access Important in OT?
  • Password and Secrets Management
    • A Guide to Passwordless and Keyless Authentication
    • Break-Glass Access
    • Credential Management System
    • Password and Key Rotation
    • Password Attack Types
    • Password Generator
    • Password Strength Best Practices
    • Password Vaults
    • Passwordless Authentication - Advantages
    • Passwordless Authentication - Implementation
    • Passwordless Explained pt. 1
    • Passwordless Explained pt. 2
    • Secrets Management Guide
    • Secrets Vault
    • Zero Standing Privileges (ZSP)
  • Privileged Access Management
    • AI in PAM for Predictive Security
    • Automating PAM
    • Best PAM Solutions 2025
    • Comparing PAM Solutions
    • Challenges in Cross-Platform PAM
    • Integrating PAM with SIEM
    • KPIs for PAM
    • Least Privilege
    • PAM Best Practices
    • PAM Checklist
    • PAM Enhances Remote Work Security
    • PAM Lifecycle Management
    • PAM Vendors: Must-Have Capabilities for Effective Access Control
    • Privileged Access Management (PAM)
    • Privileged Access Management (PAM) in the Cloud
    • PrivX MFA
    • The Strategic Role of PAM
  • PAM - IT Benefits for Different Industries
    • PAM for Pharmaceuticals Data Security
    • PAM for Healthcare
    • PrivX PA; for Financial Industry Data
    • PrivX PAM for Government and Public Sector
    • PrivX PAM for Healthcare Industry
    • PrivX PAM for Manufacturing
    • PrivX PAM for Media and Entertainment Industry
    • PrivX PAM for Pharmaceutical and Biotechnology Data
  • Privileged Accounts and Sessions
    • Privilege Elevation and Delegation Management
    • Privileged Account
    • PrivX Against Privileged Account Hijacking
    • Privileged Account and Session Management (PASM)
    • Root Accounts
  • Public Key Infrastructure (PKI)
    • What is Public Key Infrastructure (PKI)?
    • PKI Background
    • PKI Certificates
    • X.509 Certificates
  • Secure Information Sharing (SIS)
    • Business Email Compromise (BEC)
    • Business Email Compromise: How to Prevent BEC Attacks
    • Digital Signatures
    • Email Phishing
    • Enterprise Email Security
    • Secure Data Sharing
    • Secure Email Gateways (SEGs)
  • Secure Shell (SSH)
    • What is Secure Shell (SSH)?
    • What is the Secure Shell (SSH) Protocol?
    • Automated M2M Connections
    • Network Monitoring
    • OpenSSH
    • OpenSSH Server Process (SSHD)
    • Port 22
    • Remote File Copy (RCP)
    • Remote Login (rlogin)
    • Remote Shell (RSH)
    • Secure File Copy (SCP)
    • Session Key
    • Single Sign-On (SSO) Using SSH Agent
    • SSH Command
    • SSH Configuration
    • SSH for Windows
    • SSH Software Downloads
    • SSH Server
    • SSH Server Configuration
    • Tectia SSH Server
    • Telnet
    • WinSCP
    • SSH protocol Vs Microsoft: A Comprehensive Guide
  • Security Orchestration
    • Basics of Security Orchestration
    • Data Loss Prevention (DLP)
    • Security Information and Event Management (SIEM)
    • Security Operations Center (SOC)
    • Security Orchestration, Automation, and Response (SOAR)
  • SFTP & Secure Remote Access
    • File Transfer Protocol (FTP) Clients
    • File Transfer Protocol (FTP) Legacy
    • File Transfer Protocol (FTP) Servers
    • Obsolescent Secure File Transfer Protocol (FTPS)
    • Secure Remote Access (SRA)
    • SSH File Transfer Protocol (SFTP)
  • SSH Clients
    • What are SSH Clients?
    • Tectia SSH Client
    • PuTTY Background
    • PuTTY Download
    • PuTTY for Linux
    • PuTTY for Mac
    • PuTTY for Windows
    • PuTTY for Windows Installation
    • PuTTY Public Keys
    • PuTTYgen for Linux
    • PuTTYgen for Windows
  • SSH Keys
    • A Basic Overview of SSH Keys
    • Authorized Key
    • Authorized Keys File
    • Authorized Keys in OpenSSH
    • CAC and PIV Smartcards
    • Copy ID
    • Passphrase
    • Passphrase Generator
    • Public Key Authentication
    • SSH Host Key
    • SSH Key
    • SSH Key Identities
    • SSH Key Management
    • SSH Key Proliferation
    • SSH Keys for SSO
    • SSH Keygen
  • SSH Tunneling
    • SSH Tunneling
    • SSH Tunneling Example
  • Hacks, Threats & Vulnerabilities
    • BothanSpy & Gyrafalcon
    • Breaches in Operational Technology
    • Breaches Involving Passwords & Credentials
    • GoScanSSH
    • Malware
    • Man-in-the-Middle
    • Prevent Data Exfiltration with PrivX PAM
    • PrivX PAM Against Malware & Ransomware
    • Password Sniffing
What is SSH (Secure Shell)?

This is the start page for the SSH (Secure Shell) protocol, software, and related information. SSH is a software package that enables secure system administration and file transfers over insecure networks. It is used in nearly every data center and in every large enterprise.

This page was created by the inventor of SSH, Tatu Ylonen (twitter: @tjssh). He wrote ssh-1.x and ssh-2.x, and still works on related topics. The open source OpenSSH implementation is based on his free version.

Contents

The SSH protocol Download client software List of SSH implementations Running & configuring SSH Security of SSH and attacks against it Automate with SSH keys, but manage them History of the SSH protocol

New call-to-action

The SSH protocol

The SSH protocol uses encryption to secure the connection between a client and a server. All user authentication, commands, output, and file transfers are encrypted to protect against attacks in the network. For details of how the SSH protocol works, see the protocol page. To understand the SSH File Transfer Protocol, see the SFTP page.

SSH simplified protocol diagram

Download client software

Here you can find links to download various free SSH implementations. We offer various free SSH implementations for download, and provide links to commercial implementations.

  • Download PuTTY

  • Download SSH clients

New call-to-actionList of SSH implementations

We list various SSH implementations here. Feel free to submit additional implementations for this page. For many implementations we offer a review, installation instructions, guidance, and/or how-tos on this site.

  • Tectia SSH client & server for Windows, Unix, Linux - with 24x7 support

  • Tectia SSH for IBM z/OS client & server for IBM z/OS mainframes - with 24x7 support

  • PuTTY client for Windows and Linux

  • WinSCP client for Windows

  • CyberDuck client for Mac

  • OpenSSH server for Unix, Linux

  • Overview of client alternatives

  • Overview of server alternatives

  • Windows SSH alternatives

  • PrivX™ Privileged Access Management for multi-cloud

Running & configuring SSH

This section contains links topics around using, configuring, and administering SSH.

  • Command line options

  • Tectia SSH manuals

  • sshd - The SSH server on Unix/Linux

  • sshd_config - Server configuration file on Unix/Linux

  • ssh_config - Client configuration file on Unix/Linux

  • SSH port, and how it got that number

Security of SSH and attacks against it

The SSH protocol is believed to be secure against cryptographic attacks on the network, provided keys and credentials are properly managed. However, we do not recommend using diffie-hellman-group1-sha1 key exchange. It uses a 768 bit Diffie-Hellman group, which may be breakable by governments today. Larger groups are probably ok. Recent OpenSSH versions have disabled this group by default. See sshd_config for configuring what key exchanges to use.

  • Analysis of BothanSpy and Gyrfalcon - the presumed CIA hacking tools

  • Man-in-the-middle attacks against SSH

  • Imperfect forward secrecy - How Diffie-Hellman fails in practice

ssh key managementAutomate with SSH keys, but manage them

SSH keys can be used to automate access to servers. They are commonly used in scripts, backup systems, configuration management tools, and by developers and sysadmins. They also provide single sign-on, allowing the user to move between his/her accounts without having to type a password every time. This works even across organizational boundaries, and is highly convenient.

However, unmanaged SSH keys can become a major risk in larger organizations.

  • What is an SSH key

  • What SSH life cycle management means

  • Universal SSH Key Manager

  • ssh-keygen - Create keys

  • ssh-copy-id - Provision access on servers

  • authorized_keys - Authorized keys file format

The PrivX On-Demand Access Manager can be used as an alternative for SSH keys, eliminating the need for permanent keys and passwords on servers entirely.

History of the SSH protocol

The Secure Shell protocol was originally developed by Tatu Ylonen in 1995 in response to a hacking incident in the Finnish university network. A password sniffer had been installed on a server connected directly to the backbone, and when it was discovered, it had thousands of usernames and passwords in its database, including several from Ylonen's company.

That incident triggered Ylonen to study cryptography and develop a solution he could use himself for remote login over the Internet safely. His friends proposed additional features, and three months later, in July 1995, Ylonen published the first version as open source. It became OpenSSH. Later he took the protocol for standardization at the IETF and designed the SSH File Transfer Protocol (SFTP). He founded SSH Communications Security Corp in December 1995 to provide commercial support for the protocol.

Ylonen still works on topics related to Secure Shell, particularly around key management, as well as broader cybersecurity topics.

Today, the protocol is used for managing more than half of world’s web servers and practically every Unix or Linux computer, on-premise and in the cloud. Information security specialists and system administrators use it to configure, manage, maintain, and operate most firewalls, routers, switches, and servers in the millions of mission-critical networks and environments of our digital world. It is also embedded inside many file transfer and systems management solutions.

The new protocol replaced several legacy tools and protocols, including telnet, ftp, FTP/S, rlogin, rsh, and rcp.

SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

  • Solutions
    • Zero Trust Suite
    • Zero Trust Suite & Entra ID Integration
    • Quantum-Safe Cryptography (QSC)
    • SalaX Secure Collaboration
    • Security Risk Mitigation
    • OT security
    • MSP Security
    • Device Trust
    • Monitoring & Threat Intelligence
    • Credentials & Secrets Management
    • IT Audits & Compliance
  • Products
    • PrivX™ Hybrid PAM
    • PrivX Key Manager
    • Tectia SSH Client/Server™
    • Tectia™ z/OS
    • Secure Messaging
    • Secure Mail
    • Secure Sign
    • NQX™ Quantum-Safe
  • Services
    • SSH Risk Assessment™
    • Professional Services
    • Support
  • Resources
    • Careers
    • References
    • Downloads
    • Manuals
    • Events & Webinars
    • Blog
  • Company
    • About us
    • Contact
    • Investors
    • Partners
    • Press

Stay on top of the latest in cybersecurity

Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form.

© Copyright SSH • 2025 • Legal

Từ khóa » Xin Ssh