Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1087

SSH

What is SSH?

SSHA cryptographic network protocol (RFC 4251, port 22) that provides authenticated, encrypted, and integrity-protected remote login, command execution, and tunneling over an untrusted network.


Secure Shell, specified in RFC 4251-4254, replaced telnet and rlogin by combining host authentication, user authentication, and an encrypted channel on TCP port 22. It uses a Diffie-Hellman or ECDH key exchange to derive session keys, then runs an authenticated symmetric cipher (typically AES-GCM or ChaCha20-Poly1305). User authentication can be password-based, public-key, host-based, or certificate-based; key-based auth is preferred for automation. SSH also supports TCP port forwarding, SOCKS proxying, X11 forwarding, and serves as the carrier for SFTP and scp. Hardening focuses on disabling passwords, restricting algorithms, rotating host keys, using bastion hosts, and monitoring authorized_keys.

Examples

  1. 01

    An engineer runs ssh -i id_ed25519 user@bastion to reach an internal jump host.

  2. 02

    A CI/CD pipeline pushes deployments via ssh git@github.com using a deploy key.

Frequently asked questions

What is SSH?

A cryptographic network protocol (RFC 4251, port 22) that provides authenticated, encrypted, and integrity-protected remote login, command execution, and tunneling over an untrusted network. It belongs to the Network Security category of cybersecurity.

What does SSH mean?

A cryptographic network protocol (RFC 4251, port 22) that provides authenticated, encrypted, and integrity-protected remote login, command execution, and tunneling over an untrusted network.

How does SSH work?

Secure Shell, specified in RFC 4251-4254, replaced telnet and rlogin by combining host authentication, user authentication, and an encrypted channel on TCP port 22. It uses a Diffie-Hellman or ECDH key exchange to derive session keys, then runs an authenticated symmetric cipher (typically AES-GCM or ChaCha20-Poly1305). User authentication can be password-based, public-key, host-based, or certificate-based; key-based auth is preferred for automation. SSH also supports TCP port forwarding, SOCKS proxying, X11 forwarding, and serves as the carrier for SFTP and scp. Hardening focuses on disabling passwords, restricting algorithms, rotating host keys, using bastion hosts, and monitoring authorized_keys.

How do you defend against SSH?

Defences for SSH typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SSH?

Common alternative names include: Secure Shell.

Related terms

See also