Know what SSH (Secure Shell) is and what this protocol is for – WAU

SSH is a protocol that ensures that remote client and server exchange information in a secure and dynamic way. The process is capable of encrypting the files sent to the server’s directory, ensuring that changes and sending data are carried out in the best way.

The development or maintenance of websites are common demands in any company that works with these services. Maintaining process security is one of the obligations of professionals and, for this, it is necessary to use the main resources.

The SSH protocol is one of the working parameters that ensure that information is properly protected.

The communication of a computer with a server is a recurring activity during these demands of managing a website. Transferring data is an integral part of the task and, when it reaches this stage, it is essential to ensure that the process is safe and, above all, protected.

In this post we will talk more about the SSH protocol and how it becomes fundamental. Check out detailed content, according to the following topics:

Continue reading and check it out!

What is the SSH protocol?

SSH is an acronym, or acronym, for the term secure shell, which means secure capsule. In practice, the SSH protocol is a security mechanism offered by security services accommodation.

His job is to ensure that there is a secure connection between the computer and the remote server, which ensures data transfer without any loss of information.

SSH has the function of allowing users and developers make any modifications to websites and servers using a simple connection. This way, through a computer connected to the internet, this person can configure, modify files or even work on the development of a web page.

The purpose of this protocol is precisely to create a safe method that guarantees that there will be no invasion of these files and their codes. For this reason, encryptions are used to ensure that only two points access the information: the server and the computer that sent the data to that remote location.

The operation of the protocol

In practice, SSH provides the mechanism for authenticating that remote user, ensuring that that person is authorized to communicate with the server. Thus, the connection is created through the protocol and the information is transported in this secure shell model, with the encryption that protects the data.

SSH is accessed via the terminal, regardless of the operating system used, and then the encryption that will protect the information is developed. Through the window, the connection to the remote server is made, and then the process proceeds.

When does SSH need to be accessed?

SSH is a resource used at specific times and for jobs that are routine for programmers and developers. From testing to changes when the site is ready, there are several steps where you need to create a secure connection between the access point and the remote server.

Next, understand better when the protocol is used and see how it is relevant on each of these occasions.


Programming is a work step that is related to the creation of a website. Programmers develop code, make changes and need to test how all this development behaves with the application on the air.

For this, it is necessary to transfer the data to the server and then analyze the behavior of the online pages. This procedure can be done even when installing a CMS, such as WordPress. Thus, it is possible to see if the commands sent from the panel are activated correctly.

During the entire process, the exchange of information with the remote server must be made several times, which justifies the need to ensure the security of the codes. Protecting that information is the guarantee that the structure built for that site will not be unduly diverted. This protects the professional’s intellectual property and the client’s investment.


The deployment is a very common process in the routine of developers and it involves updating the website, which is usually made up of changes or new applications implemented on it. Deploy is a longer job and involves, in most cases, the transfer of a high level of files, which also requires a secure method.

Therefore, using SSH is the best way to conduct this work. The protocol is usually a recurring option for professionals responsible for taking care of these tasks. The secure shell ensures that new applications and changes are transferred at the right time, without fail and without losing any information.

What are the encryptions used by SSH?

Encryption is what guarantees, in addition to the security of the website, also the protection of this task of connection between the client and the remote server. However, there are different encryption structures that can be applied when using the SSH protocol in this demand. There are basically three alternatives: symmetric, asymmetric and hashing. Check out more about them below.

Symmetric encryption

This is a form of encryption that is performed using a secret key, which is shared only between the server and the user. Its role is to encrypt or decrypt the message that is transferred in this process, however, the secure shell only offers to read the content upon presentation of this key.

The symmetry reference nomenclature is derived from the process used to generate this key. It is created by an algorithm that automatically sends the key to the two parties involved: client and server. However, there is no transfer of this information between the two parties, it is up to the algorithm to send each one separately.

Each time an SSH session is created, a new encryption key is generated just before authentication. Thus, when transferring the file, the user already has the password used to encrypt the content and then send it to the server.

You may also be interested in this content!
Hosting security: how to guarantee your website

Asymmetric encryption

This model is the opposite of the previous one: two keys are used, one for the client and one for the server, so that there is encryption of the transferred data. The keys are called public and private, thus forming the necessary combination to generate SSH and its security protocol.

In this model, the public key is distributed openly and shared. However, from there it is not possible to find out what the private key is. This happens thanks to a process that works as follows: messages encrypted by public keys can only be decrypted by the private key of the same machine.

The private key, in the middle of this process, must remain inaccessible to third parties, being owned and used only by the customer. This is essential, since its use makes it possible to decrypt public keys, and thus access the transferred content.


Hashing is a one-way encryption method used in SSH. This practice consists of create a hash, using an algorithm, to ensure that the message is protected in a specific form of encryption and authentication codes. The process is done using HMACs (Hash-based Message Authentication Codes), ensuring that there is no violation in the codes that will be received by the remote server.

How to access the SSH protocol?

The SSH protocol can be accessed securely using two main methodologies: simple access with login and password or with a pair of keys. Next, understand how each one of them is executed and what are the processes that guarantee the security of the transfers.

With login and password

You must first connect to the website hosting server. There you need to enter the address, which is usually the website domain or even the IP, and your password. You will have this information clear, since the hosting will inform in a simple way in this relationship with the client.

After that, the terminal will be accessed normally. Then it is necessary to enter the following command, including the site name after the “@”: “$ ssh [email protected]“.

You can also use the website’s IP. To do this, use the same command, just replacing the address with the number after the “@”.

After typing the command and pressing “enter”, you will see the following message: “Are you sure you want to continue? (yes / no)“.

You will need to type “yes” and hit “enter”. Then, your password will be requested, just enter it and press “enter” again. This will make you view all files on the server, including folders. It is precisely the “public_html /” file that will be the directory to receive all these changes.

With the pair of keys

Key access is even more secure and simple: the server has a public key and the user has a private key. When crossed, they generate a combination of text that guarantees the authenticity of the access information that the client has to transfer the files.

The public key is stored on the server, while the private key is on the user’s computer. When the access request is made, the information is crossed and, if everything is right, the decryption happens normally.

The SSH protocol is a secure, dynamic possibility that ensures that the server is always available to the client. Ensuring the security of strategic information is essential so that updating websites does not generate risks.

Did you like the information we brought in this article? Taking advantage of the subject, learn all about how to perform an audit on your website!