Secure Shell ( SSH), and Telnet are two network
protocols that have been used to communicate with remote routers , servers and switches. The primary
difference is that all data sent to the remote host , including password is transmitted in clear text , and that's a big security issue.
SSH offers security mechanisms that protect the users against anyone
with malicious intent while Telnet has no security measures whatsoever and can cause all kind of trouble in our network.
You can see the options when you connect your computer to a switch or router:
Telnet
Telnet was designed to work within a
private network and not across a public network where threats can
appear. Because of this, all the data is transmitted in plain text,
including passwords. This is a major security issue and the developers
of SSH used encryption to make it harder for other people to sniff the
password and other relevant information.
Telnet also omits another
safety measure called
authentication. This ensures that the source of
the data is still the same device and not another computer. Without
authentication, another person can intercept the communication and do
what he wishes. This is also addressed in SSH as it uses a public key to
authenticate the source of the data.
SSH (Secure Shell)
Secure Shell frequently known as SSH is a
network protocol which is used to form a reliable and stable connection
among two remote computers within the network or on the internet. It
uses a an encrypted form to transmit data between
computers. This obscure language or code allows confidentiality of the
information that has been swapped.
A lot of people use of SSH for the
purpose of login to remote servers and performing remote commands and
instructions because it contains high security. With the use of this
system, any user can transfer his private details like user id,
passwords, and other personal information in a protective way. As these
data uses hidden format, and the hackers are not able to read them. It
can also be used in public networks. It gives a kind of secure
transmission over insecure paths.
Due to the security measures that
were necessary for SSH to be used in public networks, each packet
contains less data to make room for the data of the security mechanisms.
In order to transmit the same amount of data ,
you would need to take-up a lot more bandwidth. This is called overhead
and was such a major issue back when internet speeds were very low
because it translates to a performance hit.
The security issues of Telnet forced a
lot of people to use SSH in order to protect themselves. It didn’t take a
long time before SSH replaced Telnet in a great majority of its uses.
Telnet did not fade away though as it is still used in some areas,
mostly in testing and debugging. Telnet extensions were developed to
provide security but they are not used in most Telnet implementations.
Summary:
1. SSH and Telnet commonly serves the same purpose
2. SSH encrypts the data while Telnet sends data in plain text
3. SSH uses a public key for authentication while Telnet does not use any authentication
4. SSH adds a bit more overhead to the bandwidth compared to Telnet
5. SSH is more secure compared to Telnet
6. Telnet has been all but replaced by SSH in almost all uses
No comments: