![]() |
The AccuTerm forum has moved. Go to community.rocketsoftware.com to register for the new Rocket forum. |
|
Post Reply ![]() |
Author | |
timinator ![]() Newbie ![]() Joined: June 29 2007 Status: Offline Points: 17 |
![]() ![]() ![]() ![]() ![]() Posted: May 14 2015 at 7:40am |
Hi, after creating a new "telnet" session in Accuterm 7, I notice in the settings there is also a entry in the Secure Shell section with the same ip address and port 22 put in automatically . And when logging in to our HPUX server through telnet, there are a bunch of SSHD PIDS present and we suspect this could be causing some problems. Any info on this would be appreciated.
|
|
![]() |
|
PSchellenbach ![]() Admin Group ![]() Moderator Joined: December 15 2003 Location: United States Status: Offline Points: 2150 |
![]() ![]() ![]() ![]() ![]() |
Hi Tim -
The settings for host name and port are shared between telnet & ssh. If you select telnet as the connection type, only a telnet connection is opened. The spurious sshd pids must be caused by something else. Thanks, Pete |
|
![]() |
|
routeraliz ![]() Newbie ![]() Joined: April 15 2022 Status: Offline Points: 2 |
![]() ![]() ![]() ![]() ![]() |
Telnet requires a server application on the remote system so that you can manage it. It is also necessary to install the client application on the local machine. When you want to connect to with a remote system via Telnet, TCP protocol and port 23 are used to make this possible for you. After that, This system functions as a Telnet server and can receive commands. The NVT (Network Virtual Terminal) format helps in sending commands. Then, receiving and interpreting these commands are done by the server and sent to the appropriate application. In contrast, SSH provides you with a secure connection to the server through port 22 (note that you can change the port number). SSH uses key-based authentication; so after the client verifies the server, a session key is generated and sent to both client and the server. this source made a full comparision that you can use for select your best suit: |
|
![]() |
|
routeraliz ![]() Newbie ![]() Joined: April 15 2022 Status: Offline Points: 2 |
![]() ![]() ![]() ![]() ![]() |
Telnet has no authentication mechanisms for establishing a connection. However, SSH takes advantage of public-key encryption as the most common and secure SSH authentication. After SSH key pair Generation, the client keeps the private key. In the meantime, the public key is sent to a server. If a client tries to access a server using SSH, the server authenticates that client by comparing the public key to the private key. If the keys match, then two systems can establish a secure connection.
|
|
![]() |
Post Reply ![]() |
|
Tweet
|
Forum Jump | Forum Permissions ![]() You cannot post new topics in this forum You cannot reply to topics in this forum You cannot delete your posts in this forum You cannot edit your posts in this forum You cannot create polls in this forum You cannot vote in polls in this forum |