HP-UX Secure Shell Getting Started Guide HP-UX 11i v1, HP-UX 11i v2, and HP-UX 11i v3 (5900-3142, June 2013)
1 Introduction
This chapter provides an overview of HP-UX Secure Shell. HP-UX Secure Shell is a program that
enables users to securely access various network services.
This chapter addresses the following topics:
• “Overview ” (page 12)
• “Key Features” (page 12)
• “Architecture” (page 13)
• “How Secure Shell Establishes a Secure Connection” (page 14)
• “Protocol Support” (page 15)
• “HP-UX Secure Shell Commands” (page 15)
• “Keys and Configuration Files” (page 16)
Overview
HP-UX Secure Shell enables you to securely log into another system over a network, to execute
commands on a remote system, and to move files from one system to another. HP-UX Secure Shell
provides a set of commands that replace insecure commands such as rlogin, rsh, rcp, ftp,
and telnet. HP-UX Secure Shell also protects a network from the following security hazards:
IP Spoofing A technique used to gain unauthorized access to computers. An intruder
sends messages to a computer with an IP address indicating that the message
is coming from a trusted host.
Eavesdropping Searching a system for passwords, credit card numbers, or business secrets.
Hijacking A technique used to take over network communication in such a way that
the attacker can inspect and modify data transmitted between the
communicating parties.
HP-UX Secure Shell is based on the open source Secure Shell (OpenSSH) product. OpenSSH is
available in two versions: SSH Protocol Version 1 (SSH-1) and SSH Protocol Version 2 (SSH-2).
HP-UX Secure Shell supports both versions of OpenSSH. However, HP recommends SSH-2, because
it is more secure than SSH-1.
HP-UX Secure Shell establishes a secure connection between a client and a remote server over an
insecure network. The key attributes of this secure connection are the following:
• Strong authentication for both client and the remote system
• Strong encryption and public-key cryptography for communication between a client and the
remote system
• Secure channel that the client uses to execute commands on the remote system
Secure access to the remote host enables you to perform the following actions:
• Execute commands safely on a remote system
• Move files from one system to another over a secure channel
• Securely copy remote files
NOTE: All references to server and client in this document refer to HP-UX Secure Shell server and
HP-UX Secure Shell client, respectively.
Key Features
Following are the key features of HP-UX Secure Shell:
12 Introduction