SSH or Secure Shell is a cryptographic network protocol that enables secure communication and remote access over an unsecured network.
This network protocol is widely used for secure command-line login, file transfers, and tunneling of other protocols.
It provides a secure way to access and manage devices, servers, and systems by encrypting data during transmission and verifying the identity of the connecting parties.
A new version of SSH has been launched recently, SSH3, which has been revamped with HTTP using QUIC+TLS1.3 for security and HTTP Authorization for user authentication.
Compounding the problem are zero-day vulnerabilities like the MOVEit SQLi, Zimbra XSS, and 300+ such vulnerabilities that get discovered each month. Delays in fixing these vulnerabilities lead to compliance issues, these delay can be minimized with a unique feature on AppTrana that helps you to get “Zero vulnerability report” within 72 hours.
The new version brings a multitude of new enhancements, and here below, we have mentioned all the enhancements:-
SSH3 leverages TLS 1.3, QUIC, and HTTP for secure channels by adopting proven internet security methods from e-commerce and banking.
It supports standard and new authentication methods like OAuth 2.0, enabling login with accounts from Google, Microsoft, and Github.
SSH3 in early proof-of-concept needs extensive cryptographic review before production approval. Open-source for community feedback, not recommended for production without peer review.
Testing it in sandboxes/private networks is recommended due to potential risks. SSH3 offers security against scanning and dictionary attacks by hiding behind a secret link that enhances the protection against unauthorized access.
Here below, we have mentioned all the OpenSSH features implemented:-
Developers seek collaboration for the responsible progression of SSH3 by inviting security experts for code review and feedback. Encouraged to engage with standards bodies for formal IETF/IRTF processes.
With collective effort, they aim to enhance SSH3 for safe production but acknowledge the need for thorough cryptographic review and recognition by security authorities for reasonable security claims.
Try Kelltron’s cost-effective penetration testing services to evaluate digital systems security. available.
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…
A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which…
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees…
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets…
A new Mirai-based botnet, "Hail Cock Botnet," has been exploiting vulnerable IoT devices, including DigiEver…