{"draft":"draft-ietf-secsh-userauth-27","doc_id":"RFC4252","title":"The Secure Shell (SSH) Authentication Protocol","authors":["T. Ylonen","C. Lonvick, Ed."],"format":["ASCII","HTML"],"page_count":"17","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Secure Shell","abstract":"The Secure Shell Protocol (SSH) is a protocol for secure remote login\r\nand other secure network services over an insecure network. This\r\ndocument describes the SSH authentication protocol framework and\r\npublic key, password, and host-based client authentication methods.\r\nAdditional authentication methods are described in separate documents.\r\nThe SSH authentication protocol runs on top of the SSH transport layer\r\nprotocol and provides a single authenticated tunnel for the SSH\r\nconnection protocol. [STANDARDS-TRACK]","pub_date":"December 2005","keywords":["remote login","public key","password","host-based client authentication"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":["RFC8308","RFC8332"],"see_also":[],"doi":"10.17487\/RFC4252","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4252"}