cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
7927
Views
5
Helpful
3
Replies

Difference ssh version 1and version 2

SSGM95AAIBM
Level 1
Level 1

Hi,Can anyone say what is the difference ssh version 1and version 2

3 Replies 3

Scott Fella
Hall of Fame
Hall of Fame

Sure... here is a good link to look at:

https://learningnetwork.cisco.com/blogs/network-sheriff/2008/09/22/sshv1-or-sshv2-whats-the-big-deal

-Scott
*** Please rate helpful posts ***

Should downvote this, the link is broken.

kaaftab
Level 4
Level 4
SSH protocol, version 2SSH protocol, version 1
Separate transport, authentication, and connection protocolsOne monolithic protocol
Strong cryptographic integrity checkWeak CRC-32 integrity check; admits an insertion attack in conjunction with some bulk ciphers.
Supports password changingN/A
Any number of session channels per connection (including none)Exactly one session channel per connection (requires issuing a remote command even when you don't want one)
Full negotiation of modular cryptographic and compression algorithms, including bulk encryption, MAC, and public-keyNegotiates only the bulk cipher; all others are fixed
Encryption, MAC, and compression are negotiated separately for each direction, with independent keysThe same algorithms and keys are used in both directions (although RC4 uses separate keys, since the algorithm's design demands that keys not be reused)
Extensible algorithm/protocol naming scheme allows local extensions while preserving interoperabilityFixed encoding precludes interoperable additions
User authentication methods:
  • publickey (DSA, RSA*, OpenPGP)
  • hostbased
  • password
  • (Rhosts dropped due to insecurity)
Supports a wider variety:
  • public-key (RSA only)
  • RhostsRSA
  • password
  • Rhosts (rsh-style)
  • TIS
  • Kerberos
Use of Diffie-Hellman key agreement removes the need for a server keyServer key used for forward secrecy on the session key
Supports public-key certificatesN/A
User authentication exchange is more flexible, and allows requiring multiple forms of authentication for access.Allows for exactly one form of authentication per session.
hostbased authentication is in principle independent of client network address, and so can work with proxying, mobile clients, etc. (though this is not currently implemented).RhostsRSA authentication is effectively tied to the client host address, limiting its usefulness.
periodic replacement of session keysN/A
Review Cisco Networking products for a $25 gift card