How Secure Shell Works (SSH) - Computerphile
805,788
Published 2019-01-31
Dr Mike Pound on Hashing (mentions padding but full video on padding is planned to follow): • SHA: Secure Hashing Algorithm - Compu...
www.facebook.com/computerphile
twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com/
All Comments (21)
-
I remember back in 97, the university officially ended all support for non encrypted remote access, and we were all required to use SSH. Which worked fine. It also made for an excellent tunnelling tool when the same university tried blocking all access to P2P networks.
-
Can't imagine life without SSH.
-
Discovering SSH was a game changer for me after i started playing with linux. I discovered SSH forwarding and it blew my goddamn mind. It's been a life saver in a lot of situations and I'll never forget the professor that showed me how to use it.
-
Please don't blur for security. It's still readable. Use solid colored bars, for the love of Turing.
-
Fantastic. You're the professor that true geeks want. You exhibit an approachable charm beneath the geekspeak that invites questions and deep exploration into topics.
-
Just started exploring the world of SSH. I am coming back to this video with reviews on the learning and practice process.
-
Thing I love about this video is the listing paper. I bet Nottingham still have boxes and boxes of that stuff floating around from the 80s.
-
SSH tunnels let me watch this video at work without "them" knowing...
-
Would love to see a video about MOSH from you guys! Thanks, appreciate your work
-
the casual focus fade in/out makes it looks like an office episode and its just priceless/.
-
Nice tutorial. Thanks. Would talk more about the key exchange and establishing process you omitted for the purpose of this video at around 4:00?
-
perfect timing, I'm taking a networking course right now and they do a terrible job of explaining SSH
-
Thanks for the subtitles! The auto-generated ones can be pretty inconsistent.
-
Kudos for taking it down to the packet level! Many videos don't do this!
-
Have you considered doing an episode about BEEP (or BXXP)? This is a standard stream multiplexing protocol as described in RFC's 3080 and 308.
-
This was really helpful for me to better understand how it works and why we use it thanks.
-
Small detail, but I don't think padding is there to increase the security of the encryption. It's generally just added so that the data matches the block size of the encryption algorithm.
-
I think there's an error when talking about the packet format. The SSH2's specifications (RFC4253, section 6.3) states as follow: "When encryption is in effect, the packet length, padding length, payload, and padding fields of each packet MUST be encrypted with the given algorithm.". So the packet is all encrypted except the MAC field. Anyway great job as always with bringing such contents, thank you!
-
SSH is the way to go ... Nicely explained Doc.
-
I am using this tunnel, 24/7 in my PC and smartphone for over 3 years now. And I am happy