![]() "Keeping your communiqués secret" | |
Developer(s) | TheOpenBSD Project |
---|---|
Initial release | 1 December 1999; 25 years ago (1999-12-01) |
Stable release | 9.9[1] ![]() |
Repository | github |
Written in | C |
Operating system | Cross-platform[2] |
Standard(s) | RFC 4250, RFC 4251, RFC 4252, RFC 4253, RFC 4254, RFC 4255, RFC 4256, RFC 4335, RFC 4344, RFC 4345, RFC 4419, RFC 4462, RFC 5656, RFC 6594, RFC 6668, RFC 7479[3] |
Type | Remote access |
License | BSD,ISC,public domain |
Website | openssh.com |
OpenSSH (also known asOpenBSD Secure Shell[a]) is a suite ofsecurenetworking utilities based on theSecure Shell (SSH) protocol, which provides asecure channel over an unsecured network in aclient–server architecture.[4][5]
OpenSSH started as afork of thefree SSH program developed by Tatu Ylönen; later versions of Ylönen's SSH wereproprietary software offered bySSH Communications Security.[6] OpenSSH was first released in 1999 and is currently developed as part of theOpenBSDoperating system.
OpenSSH is not a single computer program, but rather a suite of programs that serve as alternatives to unencrypted protocols likeTelnet andFTP. OpenSSH is integrated into several operating systems, namelyMicrosoft Windows,macOS and mostLinux operating systems,[7][8] while theportable version is available as a package in other systems.[9][10][11]
OpenBSD Secure Shell was created byOpenBSD developers as an alternative to the original SSH software by Tatu Ylönen, which is nowproprietary software.[12] Althoughsource code is available for the original SSH, various restrictions are imposed on its use and distribution. OpenSSH was created as afork of Björn Grönvall'sOSSH that itself was a fork of Tatu Ylönen's original free SSH 1.2.12 release,[13] which was the last one having a license suitable for forking.[14][15] The OpenSSH developers claim that their application is more secure than the original, due to their policy of producing clean andaudited code and because it is released under theBSD license, theopen-source license to which the wordopen in the name refers.
OpenSSH first appeared in OpenBSD 2.6. The first portable release was made in October 1999.[16] Developments since then have included the addition of ciphers (e.g.,ChaCha20-Poly1305 in 6.5 of January 2014[17]), cutting the dependency onOpenSSL (6.7, October 2014[18]) and an extension to facilitatepublic-key discovery and rotation for trusted hosts (for transition fromDSA toEd25519 public host keys, version 6.8 of March 2015[19]).
On 19 October 2015,Microsoft announced that OpenSSH will be natively supported onMicrosoft Windows and accessible throughPowerShell, releasing an early implementation and making the code publicly available.[20] OpenSSH-based client and server programs have been included inWindows 10 since version 1803. The SSH client and key agent are enabled and available by default, and the SSH server is an optional Feature-on-Demand.[21]
In October 2019 protection for private keys at rest in RAM against speculation and memoryside-channel attacks were added in OpenSSH 8.1.[22]
OpenSSH is developed as part of the OpenBSDoperating system. Rather than including changes for other operating systems directly into OpenSSH, a separateportability infrastructure is maintained by the OpenSSH Portability Team, and "portable releases" are made periodically. This infrastructure is substantial, partly because OpenSSH is required to performauthentication, a capability that has many varying implementations. This model is also used for other OpenBSD projects such asOpenNTPD.
The OpenSSH suite includes the followingcommand-line utilities anddaemons:
The OpenSSH server can authenticate users using the standard methods supported by theSSH protocol: with a password;public-key authentication, using per-user keys; host-based authentication, which is a secure version ofrlogin's host trust relationships using public keys; keyboard-interactive, a genericchallenge–response mechanism, which is often used for simple password authentication, but which can also make use of stronger authenticators such astokens; andKerberos/GSSAPI. The server makes use of authentication methods native to the host operating system; this can include using theBSD Authentication system orpluggable authentication modules (PAM) to enable additional authentication through methods such asone-time passwords. However, this occasionally has side effects: when using PAM with OpenSSH, it must be run asroot, as root privileges are typically required to operate PAM. OpenSSH versions after 3.7 (16 September 2003) allow PAM to be disabled at run-time, so regular users can run sshd instances.
On OpenBSD, OpenSSH uses a dedicatedsshd user by default to drop privileges and perform privilege separation in accordance with theprinciple of least privilege, applied throughout the operating system including theXenocaraX server.
OpenSSH includes the ability to set up a secured channel through which data sent to local, client-sideUnix domain sockets or local, client-sideTCP ports may be "forwarded" (sent across the secured channel) for routing on the server side; when this forwarding is set up, the server is instructed to send that forwarded data to some socket or TCP host/port (the host could be the server itself, "localhost"; or, the host may be some other computer, so that it appears to the other computer that the server is the originator of the data). The forwarding of data is bidirectional, meaning that any return communication is itself forwarded back to the client-side in the same manner; this is known as an "SSH tunnel",[23] and it can be used to multiplex additional TCP connections over a single SSH connection since 2004,[24] to conceal connections, to encrypt protocols that are otherwise unsecured, and to circumvent firewalls by sending/receiving all manner of data through one port that is allowed by the firewall. For example, anX Window System tunnel may be created automatically when using OpenSSH to connect to a remote host, and other protocols, such asHTTP andVNC, may be forwarded easily.[25]
Tunneling a TCP-encapsulating payload (such asPPP) over a TCP-based connection (such as SSH'sport forwarding) is known as "TCP-over-TCP", and doing so can induce a dramatic loss in transmission performance due to theTCP meltdown problem,[26][27] which is whyvirtual private network software may instead use for the tunnel connection a protocol simpler than TCP. However, this is often not a problem when using OpenSSH's port forwarding, because many use cases do not entail TCP-over-TCP tunneling; the meltdown is avoided because the OpenSSH client processes the local, client-side TCP connection in order to get to the actual payload that is being sent, and then sends that payload directly through the tunnel's own TCP connection to the server side, where the OpenSSH server similarly "unwraps" the payload in order to "wrap" it up again for routing to its final destination.[28]
In addition, some third-party software includes support for tunnelling over SSH. These includeDistCC,CVS,rsync, andFetchmail. On some operating systems, remotefile systems can be mounted over SSH using tools such assshfs (usingFUSE).
Anad hocSOCKS proxy server may be created using OpenSSH. This allows more flexible proxying than is possible with ordinary port forwarding.
Beginning with version 4.3, OpenSSH implements anOSI layer 2/3tun-basedVPN. This is the most flexible of OpenSSH's tunnelling capabilities, allowing applications to transparently access remote network resources without modifications to make use of SOCKS.[29]
OpenSSH supports the following public key types:[30][31]
This sectionmay need to be rewritten to comply with Wikipedia'squality standards.You can help. Thetalk page may contain suggestions.(May 2017) |
Before version 5.2 of OpenSSH, it was possible for an attacker to recover up to 14 bits of plaintext with a success probability of 2−14.[39] The vulnerability was related to the CBC encryption mode. The AES CTR mode and arcfour ciphers are not vulnerable to this attack.
A local privilege escalation vulnerability existed in OpenSSH 6.8 to 6.9 (CVE-2015-6565) due to world-writable (622)TTY devices, which was believed to be adenial of service vulnerability.[40] With the use of the TIOCSTIioctl, it was possible for authenticated users to inject characters into other users terminals and execute arbitrary commands on Linux.[41]
Malicious or compromised OpenSSH servers could read sensitive information on the client such as private login keys for other systems, using a vulnerability that relies on the undocumented connection-resuming feature of the OpenSSH client, which is called roaming, enabled by default on the client, but not supported on the OpenSSH server. This applies to versions 5.4 (released on 8 March 2010[42]) to 7.1 of the OpenSSH client, and was fixed in OpenSSH 7.1p2, released on 14 January 2016.CVE numbers associated to this vulnerability areCVE-2016-0777 (information leak) andCVE-2016-0778 (buffer overflow).[43][44]
On March 29, 2024, a serioussupply chain attack onXZ Utils has been reported, targeting indirectly the OpenSSH server (sshd) running on Linux. The OpenSSH code is not directly concerned, the backdoor is caused by the dependencies on liblzma vialibsystemd applied by a tierce patch, applied by various Linux distributions.[citation needed]
On July 1, 2024, theRegreSSHion security vulnerability was disclosed, which could enable a remote attacker to cause OpenSSH toexecute arbitrary code and gain full root access. It was inadvertently introduced in prior OpenSSH version 8.5p1 in October 2020, and was patched following version 9.8/9.8p1.[45][46]
In February 2001, Tatu Ylönen, chairman and CTO of SSH Communications Security informed the OpenSSH development mailing list that the company intended to assert its ownership of the "SSH" and "Secure Shell"trademarks,[47] and sought to change references to the protocol to "SecSH" or "secsh", in order to maintain control of the "SSH" name. He proposed that OpenSSH change its name in order to avoid a lawsuit, a suggestion that developers resisted. OpenSSH developer Damien Miller replied urging Ylönen to reconsider, arguing that "SSH" had long since been ageneric trademark.[48]
At the time, "SSH", "Secure Shell" and "ssh" had appeared in documents proposing the protocol as an open standard. Without marking these within the proposal as registered trademarks, Ylönen ran the risk of relinquishing all exclusive rights to the name as a means of describing the protocol. Improper use of a trademark, or allowing others to use a trademark incorrectly, results in the trademark becoming a generic term, likeKleenex orAspirin, which opens the mark to use by others.[49] After study of theUSPTO trademark database, many online pundits opined that the term "ssh" was not trademarked, merely the logo using the lower case letters "ssh". In addition, the six years between the company's creation and the time when it began to defend its trademark, and that only OpenSSH was receiving threats of legal repercussions, weighed against the trademark's validity.[50]
Both developers of OpenSSH and Ylönen himself were members of the IETF working group developing the new standard; after several meetings this group denied Ylönen's request to rename the protocol, citing concerns that it would set a bad precedent for other trademark claims against the IETF. The participants argued that both "Secure Shell" and "SSH" were generic terms and could not be trademarks.[6]
This is the port of OpenBSD's excellent OpenSSH to Linux and other Unices.
the TCP forwarding code is pretty speedy as well. Just to pre-answer a question, ssh decapsulates and re-encapsulates TCP, so you don't have classic TCP-over-TCP issues.
ssh(1)
– OpenBSD General CommandsManualsshd(8)
– OpenBSD System Manager'sManual