LETS TALK ABOUT SSH AND SSL/TLS
Hello everyone! I am Amila Munasinghe. I am studying at Department of Computing and Information Systems, Faculty of Applied Sciences, Sabaragamuwa University of Sri Lanka and this is my very first blog post. I hope to write a couple of articles about SSH, SSL protocols.
What is SSH?
Secure shell, or SSH for short, is a method of
securely communicating with a remote computer. SSH is a command execution
protocol that interacts with another system's operating shell to execute
commands remotely. SSH was originally designed for UNIX-based computers,
although it is now widely used on Windows.
You'll note that SSH uses TCP port 22 to communicate.
Putty's other login methods, such as telnet and Rlogin, don't offer the same
level of security as SSH. The SSH protocol was designed to replace insecure
remote connection techniques. SSH is a cryptographic protocol that establishes
a secure connection between two computers. The distant system shell is visible
after the tunnel is formed, and shell commands can be securely relayed across
the connection.
What is SSL/TLS?
We've combined these two methods into one because
they're very similar. Both are still in use, although in network
implementations, TLS is gradually replacing SSL. These are both cryptographic
protocols, like SSH. The setup, however, is different. To ensure security and
integrity to website transactions, an SSL/TLS connection makes use of the
Public Key Infrastructure (PKI) and digital certificates.
Website security is provided via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. While SSL 2.0 and 3.0 are no longer supported by the IETF, they have been deprecated in favor of TLS (Some have suggested that TLS is an upgraded version of SSL 3.0). TLS, on the other hand, is more robust and secure in the face of new threats and weaknesses. When it comes to TLS versions, TLS 1.2 and 1.3 are the most recent versions that major browser authorities have adopted. TLS 1.2 enables advanced encryption such as ECC and AEAD cipher blocks, while TLS 1.3 enhances TLS 1.2's functionality while also preventing downgrade attacks.
SSL and TLS are handshake protocols. They're part of a server/client architecture, which involves sending and receiving requests and responses to establish a connection between two machines. An example of a TLS 1.3 handshake is shown below:
To enable a trust
relationship between users and providers, SSL and TLS require digital
signatures provided by Certificate Authorities. Once the link is established,
sensitive data, such as that shared between a bank and its customers, can be
safely transmitted. Port 443 is the standard TCP port for Hypertext Transfer
Protocol over SSL/TLS (HTTPS).
Differences Between SSH and SSL/TLS Security Protocols
SSH and SSL/TLS are
used for different things. Network administrators frequently utilize SSH for
tasks that a typical internet user would never have to deal with. The normal
internet user, on the other hand, uses SSL/TLS all of the time. When someone
visits a website with a URL that begins with HTTPS, he is visiting a site that
uses SSL/TLS.
SSH |
SSL/TLS |
Working based on network tunnels. |
Working based on digital certificates. |
A remote protocol |
A security protocol |
Runs on port 22 |
Runs on port 443 |
Data integrity is measured with algorithms
like SHA, SHA-2, SHA-256 |
Data integrity is measured with the message digest
and added to encrypted data before the data is sent. |
It is used to reduce security threats for
remote server login |
It allows secure transition of data between a
server and the browser thus, keeps information intact. |
SSH uses a username/password authentication
system to establish a secure connection. |
SSL normally uses X.509 digital certificates
for server and client authentication. |
SSH is for securely executing commands on a
server. |
SSL is used for securely communicating
personal information. |
SSH follows authentication process by
server’s verification done by client, session key generation, and client’s
authentication |
SSL follows authentication process by
exchange of digital certificate |
Similarities Between SSH and SSL/TLS
Because both SSH and SSL are three-digit abbreviations that begin with the same letter, it's acceptable if they're confused. However, there are some parallels. To begin, two (and all three) of these protocols are utilized in secure connections. Both employ encryption to keep data safe as it travels between network devices. The goal of both protocols is to establish a secure connection. Without these two methods, we would not be able to conduct business on the internet as securely as we do now.
Conclusion
While both protocols have various uses, the
fundamental differences are evident. SSH is primarily a tool for technicians,
whereas SSL/TLS provides a user-invisible security technique for websites.
These two, of course, are not mutually exclusive. As part of its secure
solution, SSH may use SSL/TLS. These adaptable protocols can be implemented in
a number of different ways. With all of the internet hazards that we face these
days, they are essential. It's again another warning that when using online
tools, we must all be cautious and watchful.
good work amila.. keep up!!!
ReplyDeleteThanks Mr Ashen
Delete