Reader small image

You're reading from  Hands-On Network Programming with C

Product typeBook
Published inMay 2019
Reading LevelIntermediate
PublisherPackt
ISBN-139781789349863
Edition1st Edition
Languages
Concepts
Right arrow
Author (1)
Lewis Van Winkle
Lewis Van Winkle
author image
Lewis Van Winkle

Lewis Van Winkle is a software programming consultant, entrepreneur, and founder of a successful IoT company. He has over 20 years of programming experience after publishing his first successful software product at age 12. He has over 15 years of programming experience with the C programming language on a variety of operating systems and platforms. He is active in the open-source community and has published several popular open-source programs and librariesmany of them in C. Today, Lewis spends much of his time consulting, where he loves taking on difficult projects that other programmers have given up on. He specializes in network systems, financial systems, machine learning, and interoperation between different programming languages.
Read more about Lewis Van Winkle

Right arrow

Chapter 11, Establishing SSH Connections with libssh


  1. What is a significant downside of using Telnet?

Essentially, Telnet provides no security features. Passwords are sent as plaintext.

  1. Which port does SSH typically run on?

SSH's official port is TCP port 22. In practice, it is common to run SSH on arbitrary ports in an attempt to hide from attackers. With a properly secured server, these attackers are a nuisance rather than a legitimate threat.

  1. Why is it essential that the client authenticates the SSH server?

If the client doesn't verify the SSH server's identity, then it could be tricked into sending credentials to an impostor.

  1. How is the server typically authenticated?

SSH servers typically use certificates to identity themselves. This is similar to how servers are authenticated when using HTTPS.

  1. How is the SSH client typically authenticated?

It is still common for clients to authenticate with a password. The downside to this method is that if a client is somehow tricked into connecting to an impostor server, then their password will be compromised. SSH provides alternate methods, including authenticating clients using certificates, that aren't susceptible to replay attacks.

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Hands-On Network Programming with C
Published in: May 2019Publisher: PacktISBN-13: 9781789349863

Author (1)

author image
Lewis Van Winkle

Lewis Van Winkle is a software programming consultant, entrepreneur, and founder of a successful IoT company. He has over 20 years of programming experience after publishing his first successful software product at age 12. He has over 15 years of programming experience with the C programming language on a variety of operating systems and platforms. He is active in the open-source community and has published several popular open-source programs and librariesmany of them in C. Today, Lewis spends much of his time consulting, where he loves taking on difficult projects that other programmers have given up on. He specializes in network systems, financial systems, machine learning, and interoperation between different programming languages.
Read more about Lewis Van Winkle