Secure Shell (SSH): Public Key Authentication over Hypertext Transfer Protocol (HTTP)
نویسنده
چکیده
The Secure Shell (SSH) protocol requires all implementations to support public key authentication method (“publickey”) for authentication purposes [2]. Hypertext Transfer Protocol (HTTP) applications which provide a SSH client over the web browser need to support “publickey”. However, restrictions in HTTP, such as Same Origin Policy, make it difficult to perform such authentications. In this document, a system to perform “publickey” authentication over HTTP is provided. It is ensured that no compromise is made that would pose a security risk to SSH protocol.
منابع مشابه
Architectural Defects of the Secure Shell
Although some flaws have been found out in the SSH, the Secure Shell, there is not so much discussion about its architecture or design safety. Therefore, in this paper, considering the SSH’s architecture, e.g. the key exchange protocol, the user authentication protocols and its total design of the SSH, we not only discuss the SSH’s architectural safety but show some critical flaws for SSH users...
متن کاملGeneric Security Service Application Program Interface (GSS-API) Authentication and Key Exchange for the Secure Shell (SSH) Protocol
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract The Secure Shell protocol (SSH) ...
متن کاملSecuring Remote Procedure Calls over HTTPS
Remote Procedure Calls (RPC) are widely used over the Internet as they provide a simple and elegant way of interaction between the client and the server. This paper proposes a solution for securing the remote procedure calls (RPC) by tunneling it through HTTPS (Hypertext Transfer Protocol over Secure Socket Layer). RPC over HTTP actually uses the Secure Socket Layer (SSL) protocol as a transpor...
متن کاملGeneric Message Exchange Authentication for the Secure Shell Protocol (SSH)
The Secure Shell Protocol (SSH) is a protocol for secure remote login and other secure network services over an insecure network. This document describes a general purpose authentication method for the SSH protocol, suitable for interactive authentications where the authentication data should be entered via a keyboard (or equivalent alphanumeric input device). The major goal of this method is t...
متن کاملSecure 2-Way Authentication for SIP
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols to control media communication sessions. It is a text-based application control protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP) and is a strong signaling protocol on the internet for establishment, maintenance, and termination of media session...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1506.05073 شماره
صفحات -
تاریخ انتشار 2015