设为首页收藏本站language 语言切换
查看: 1185|回复: 0
收起左侧

[Sec] 关于350 018第5题

[复制链接]
发表于 2015-11-12 07:18:57 | 显示全部楼层 |阅读模式

What's the difference between versions 1 and 2 of the SSH protocol?
SSH protocol, version 2SSH protocol, version 1
Separate transport, authentication, and connection protocolsOne monolithic protocol
Strong cryptographic integrity checkWeak CRC-32 integrity check; admits an insertion attack in conjunction with some bulk ciphers.
Supports password changingN/A
Any number of session channels per connection (including none)Exactly one session channel per connection (requires issuing a remote command even when you don't want one)
Full negotiation of modular cryptographic and compression algorithms, including bulk encryption, MAC, and public-keyNegotiates only the bulk cipher; all others are fixed
Encryption, MAC, and compression are negotiated separately for each direction, with independent keysThe same algorithms and keys are used in both directions (although RC4 uses separate keys, since the algorithm's design demands that keys not be reused)
Extensible algorithm/protocol naming scheme allows local extensions while preserving interoperabilityFixed encoding precludes interoperable additions
User authentication methods:
  • publickey (DSA, RSA*, OpenPGP)
  • hostbased
  • password
  • (Rhosts dropped due to insecurity)
Supports a wider variety:
  • public-key (RSA only)
  • RhostsRSA
  • password
  • Rhosts (rsh-style)
  • TIS
  • Kerberos
Use of Diffie-Hellman key agreement removes the need for a server keyServer key used for forward secrecy on the session key
Supports public-key certificatesN/A
User authentication exchange is more flexible, and allows requiring multiple forms of authentication for access.Allows for exactly one form of authentication per session.
hostbased authentication is in principle independent of client network address, and so can work with proxying, mobile clients, etc. (though this is not currently implemented).RhostsRSA authentication is effectively tied to the client host address, limiting its usefulness.
periodic replacement of session keysN/A
* Not all SSH-2 implementations support RSA yet for user authentication or host keys, since it's a relatively recent addition. The RSA algorithm was originally omitted from the protocol due to its patent status, but that patent has since expired.






这是网上找的 我们一起研究下选什么...

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-12 18:29 , Processed in 0.067728 second(s), 24 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表