The SSH-2 protocol supports the following user authentications:

* Public key authentication (DSA, RSA*, OpenPGP)
* Host-based authentication
* Password-based authentication

Note: SSH-1 supports a wider range of user authentications, i.e., the public-key, RSA only, RhostsRSA, password, Rhosts (rsh-style), TIS, and Kerberos authentications.

Explore More

US Army banned the use of USB drives from its computers

They say they are the most powerful; they have their units in many countries; they attack anywhere on the globe; they have hundreds of spies and spy satellites all around

What are the security holes in the Basic Authentication scheme?

The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication

What are the various methods of passive OS fingerprinting?

In passive OS fingerprinting, an attacker installs a sniffer on any third party such as a router on which the victim communicates frequently. Now he studies the sniffer’s log and