Chapter 13. Overview of Other Implementations
SSH isn't just a Unix
technology. It's been implemented also for Windows, Macintosh,
Amiga, OS/2, VMS, BeOS, PalmOS, Windows CE, and Java. Some programs
are original, finished products, and others are ports of SSH1 or SSH2
undertaken by volunteers and in various stages of completion.
For the remainder of this book, we cover several robust
implementations of SSH for Windows (95, 98, NT, 2000) and the
Macintosh. These are complete, usable products, in our opinions. We
also provide pointers to other implementations if you wish to
experiment with them.
We have set up a web page pointing to
all SSH-related products that we know. From this book's catalog
page:
http://www.oreilly.com/catalog/sshtdg/
follow the link labeled Authors' Online Resources, or visit us
directly at:
http://www.snailbook.com/
Also check out this third-party page documenting free SSH
implementations:
http://www.freessh.org/
13.1. Common Features
Every SSH implementation has a
different set of features, but they all have one thing in common: a
client program for logging into remote systems securely. Some clients
are command-line based, and others operate like graphical terminal
emulators, opening windows with dozens of configurable settings.
The remaining features vary widely across implementations. Secure
file copy (
scp and
sftp),
remote batch command execution, SSH servers, SSH agents, and
particular authentication and encryption algorithms are found in only
some of the products.
Nearly all implementations include a generator of public and private
keys. For example, ports of SSH1/SSH2 have
ssh-keygen, F-Secure SSH Client has Keygen Wizard,
and SecureCRT has Key Generation Wizard. NiftyTelnet SSH for the
Macintosh is a notable exception: it can't generate keys, but
it accepts keys generated by other programs in the standard SSH-1
format.
| | |
12.4. Reporting Bugs | | 13.2. Covered Products |