Revision: 10382 https://osdn.net/projects/ttssh2/scm/svn/commits/10382 Author: nmaya Date: 2022-11-26 21:06:44 +0900 (Sat, 26 Nov 2022) Log Message: ----------- ドキュメントの SSH の説明を修正 Modified Paths: -------------- branches/4-stable/doc/en/html/reference/sourcecode.html branches/4-stable/doc/en/html/usage/ssh.html branches/4-stable/doc/ja/html/reference/sourcecode.html branches/4-stable/doc/ja/html/usage/ssh.html -------------- next part -------------- Modified: branches/4-stable/doc/en/html/reference/sourcecode.html =================================================================== --- branches/4-stable/doc/en/html/reference/sourcecode.html 2022-11-26 08:40:33 UTC (rev 10381) +++ branches/4-stable/doc/en/html/reference/sourcecode.html 2022-11-26 12:06:44 UTC (rev 10382) @@ -912,12 +912,9 @@ <h3>Sequence Control</h3> SSH protocol allows to encrypt client-server communication by using encryption key. Public-key based encryption (asymmetric) provides higher level of security, however it is more resource intensive and not used with SSH. SSH2 utilizes symmetric encryption algorithms with shared key - AES (Advanced Encryption Standard: Rijndael algorithm) and 3DES (Triple Data Encryption Standard). <br> - -The key is securely shared between two parties establishing connection and is unknown to a third party. As per SSH2 protocol, when client opens TCP connection to a remote host (SSH server), unique DH key is generated based on "Diffie-Hellman" algorithm. This key is only known to the client and to the server. <br> -Prior to creation of DH key, network packets are transmitted unencrypted (as a clear text) and can be captured by a third party, however DH algorithm allows to establish a shared secret between two parties in such a way that it cannot be compromised. <br> - -Once shared key has been generated, it can be used to encrypt and decrypt the packets. SSH2 protocol assigns each packet the Message Number in the range 1 to 255. Message number describes the payload of the packet. RFC4250 contains the list of all supported message numbers. SSH messages also have names that start with "SSH2_MSG_". They are defined as macros in TTSSH source code. <br> - +The key is securely shared between two parties establishing connection and is unknown to a third party. As per SSH2 protocol, when client opens TCP connection to a remote host (SSH server), a shared key is shared based on "Diffie-Hellman" algorithm. This key is only known to the client and to the server. <br> +Prior to finish share of shared key, network packets are transmitted unencrypted (as a clear text) and can be captured by a third party, however DH algorithm allows to share a shared key between two parties in such a way that it cannot be compromised. <br> +Once shared key has been shared, it can be used to encrypt and decrypt the packets. SSH2 protocol assigns each packet the Message Number in the range 1 to 255. Message number describes the payload of the packet. RFC4250 contains the list of all supported message numbers. SSH messages also have names that start with "SSH2_MSG_". They are defined as macros in TTSSH source code. <br> The drawing below shows the packet flow for TCP connection from a client to a server on the default SSH port 22 with password based user authentication. <br> Modified: branches/4-stable/doc/en/html/usage/ssh.html =================================================================== --- branches/4-stable/doc/en/html/usage/ssh.html 2022-11-26 08:40:33 UTC (rev 10381) +++ branches/4-stable/doc/en/html/usage/ssh.html 2022-11-26 12:06:44 UTC (rev 10382) @@ -23,7 +23,8 @@ </p> <p> - There are several ways of connection of SSH as follows + There are several ways of authentication methods of SSH as follows + </p> <ul> <li>Password authentication</li> <li>Public Key (and Private key pair) authentication @@ -33,8 +34,9 @@ </li> <li>rhosts authentication for SSH1</li> <li>challenge/response(TIS) authentication for SSH1</li> - <li>keyboard-interactive authentication for SSH2</li> + <li>keyboard-interactive authentication for SSH2</li> </ul> + <p> In this document, we will describe Password authentication and Key-pair authentication which would be most widely used. </p> @@ -41,21 +43,21 @@ <h2 id="connproc">Procedure of connection</h2> <p> - When Tera Term is activated, the following dialog will let you choose login procedure. + When Tera Term is activated, the following dialog will let you choose a way of connecting. </p> <div class="img"><img src="../image/NewConnection.png" alt="connection dialog"></div> <p> - When using SSH, you should change SSH version in a default parameter. Make sure that it is synchronized to the host to be connected. + When using SSH, you should match SSH version to the host to be connected. </p> <p id="ssh_auth_dialog"> Once connected, then you will be prompted to select authentication method in a dialog.<br /> - You can change default value in <a href="../menu/setup-sshauth.html">"TTSSH: Authentication Setup" dialog</a> + You can change default value of this dialog in <a href="../menu/setup-sshauth.html">"TTSSH: Authentication Setup" dialog</a> </p> <div class="img"><img src="../image/Authentication.png" alt="Authentication method"></div> <p> The TTSSH can support some authentication methods and a user should select one of methods. When an authentication method is failed, the TTSSH does not retry to authenticate another method.<br> - For example, the OpenSSH client will be able to login to the server without regard to the difference the password and the keyboard-interactive authentication. However, the TTSSH can not login to the server with the keyboard-interactive and public key authentication by using the password authentication. + For example, the OpenSSH client will be able to login to the server without regard to the difference the password and the keyboard-interactive authentication. However, the TTSSH can not login to the server which only enabled keyboard-interactive and public key authentication by using the password authentication. </p> <ul> <li>If you want to use Password authentication, then make sure that [Use plain password to log in] is chcked and type in username and password. If they are correct, you can login.<br> Modified: branches/4-stable/doc/ja/html/reference/sourcecode.html =================================================================== --- branches/4-stable/doc/ja/html/reference/sourcecode.html 2022-11-26 08:40:33 UTC (rev 10381) +++ branches/4-stable/doc/ja/html/reference/sourcecode.html 2022-11-26 12:06:44 UTC (rev 10382) @@ -891,9 +891,9 @@ <h3>\x83V\x81[\x83P\x83\x93\x83X\x90\xA7\x8C\xE4</h3> -\x81 @ SSH2\x90ڑ\xB1\x82\xF0\x8Ds\x82\xA4\x82\xB1\x82ƂŁA\x92ʐM\x8Co\x98H\x82\xF0\x88Í\x86\x89\xBB\x82\xB7\x82邱\x82Ƃ\xAA\x82ł\xAB\x82\xE9\x82̂\xAA\x93\xC1\x92\xA5\x82ł\xB7\x82\xAA\x81A\x83p\x83P\x83b\x83g\x82̈Í\x86\x89\xBB\x82\xF0\x8Ds\x82\xA4\x82\xBD\x82߂ɂ́A\x81u\x8C\xAE\x81v\x82\xAA\x95K\x97v\x82ł\xB7\x81B\x92ʐM\x8Co\x98H\x82̈Í\x86\x89\xBB\x82ɂ́A\x8B\xA4\x92ʌ\xAE\x82ɂ\xE6\x82鋤\x92ʌ\xAE\x88Í\x86\x82\xAA\x97\x98\x97p\x82\xB3\x82\xEA\x82܂\xB7\x81B\x8C\xF6\x8AJ\x8C\xAE\x88Í\x86\x82̂ق\xA4\x82\xAA\x83Z\x83L\x83\x85\x83\x8A\x83e\x83B\x8B\xAD\x93x\x82͍\x82\x82\xA2\x82̂ł\xB7\x82\xAA\x81A\x88Í\x86\x8F\x88\x97\x9D\x82ɑ\xBD\x91\xE5\x82Ȏ\x9E\x8AԂ\xAA\x82\xA9\x82\xA9\x82邽\x82߁ASSH\x82̂悤\x82ȒʐM\x90\xAB\x94\\x82\xAA\x97v\x8B\x81\x82\xB3\x82\xEA\x82邵\x82\xAD\x82݂ł͍̗p\x82\xB3\x82\xEA\x82܂\xB9\x82\xF1\x81BSSH2\x82ł́A\x8B\xA4\x92ʌ\xAE\x88Í\x86\x83A\x83\x8B\x83S\x83\x8A\x83Y\x83\x80\x82Ƃ\xB5\x82āAAES(Advanced Encryption Standard\x81FRijndael\x83 A\x83\x8B\x83S\x83\x8A\x83Y\x83\x80)\x82\xE23DES(Triple DES)\x82Ȃǂ\xAA\x97\x98\x97p\x82\xB3\x82\xEA\x82܂\xB7\x81B<br> -\x81@\x8B\xA4\x92ʌ\xAE\x82͒ʐM\x82\xF0\x8Ds\x82\xA4\x93\xF1\x8EҊԂł݂̂ɋ\xA4\x97L\x82\xB3\x82\xEA\x82\xE9\x8F\xEE\x95\xF1\x82ł\xA0\x82\xE8\x81A\x91\xE6\x8EO\x8E҂ɒm\x82\xE7\x82\xEA\x82Ă͂Ȃ\xE8\x82܂\xB9\x82\xF1\x81BSSH2\x82ł́A\x83N\x83\x89\x83C\x83A\x83\x93\x83g\x82\xAA\x83\x8A\x83\x82\x81[\x83g\x83z\x83X\x83g\x81iSSH\x83T\x81[\x83o\x81j\x82\xD6TCP\x90ڑ\xB1\x82\xB5\x82\xBD\x8E\x9E\x82ɁA"Diffie-Hellman"\x83A\x83\x8B\x83S\x83\x8A\x83Y\x83\x80\x82\xF0\x83x\x81[\x83X\x82Ƃ\xB5\x82\xBD\x93Ǝ\xA9\x82̕\xFB\x8E\xAE\x82ɂ\xE6\x82\xE8\x81A\x83N\x83\x89\x83C\x83A\x83\x93\x83g\x82ƃT\x81[\x83o\x82ł\xB5\x82\xA9\x92m\x82蓾\x82Ȃ\xA2DH(Diffie-Hellman)\x8C\xAE\x82\xAC\x82\xB5\x82܂\xB7\x81BDH\x8C\xAE\x90\xB6\x90\xAC\x82܂ł̉ߒ\xF6\x82́A\x83l\x83b\x83g\x83\x8F\x81[\x83N\x8F\xE3\x82\xF0\x83p\x83P\x83b\x83g\x82\xAA\x95\xBD\x95\xB6\x82ŗ\xAC\x82\xEA\x82邽\x82߁A\x91\xE6\x8EO\x8E҂ɂ\xE6\x82\xE9\x83p\x83P\x83b\x83g\x83L\x83\x83\x83v\x83`\x83\x83\x82\xAA\x89\\x82ƂȂ\xC1\x82Ă\xA 2\x82܂\xB7\x82\xAA\x81A\x83p\x83P\x83b\x83g\x82\xF0\x94`\x82\xA9\x82\xEA\x82Ă\xE0\x81ADH\x8C\xAE\x82͗\x9D\x98_\x8F\xE3\x91\xE6\x8EO\x8E҂ɂ͕\xAA\x82\xA9\x82\xE7\x82Ȃ\xA2\x82悤\x82ɂȂ\xC1\x82Ă\xA2\x82܂\xB7\x81B<br> -\x81@\x8B\xA4\x92ʌ\xAE\x82\xAA\x90\xB6\x90\xAC\x82ł\xAB\x82\xBD\x82\xA0\x82Ƃ́A\x82\xBB\x82̌\xAE\x82\xF0\x8Eg\x82\xC1\x82ăp\x83P\x83b\x83g\x82\xF0\x88Í\x86\x89\xBB\x82\xB5\x82܂\xB7\x81BSSH2\x82ł́A\x91\x97\x8E\xF3\x90M\x82\xB3\x82\xEA\x82\xE9\x83p\x83P\x83b\x83g\x82͎\xED\x97ނ\xAA\x82\xA0\x82邽\x82߁A\x82\xBB\x82ꂼ\x82\xEA\x82Ɂu\x83\x81\x83b\x83Z\x81[\x83W\x94ԍ\x86\x81v\x82\xF0\x8A\x84\x82\xE8\x90U\x82\xC1\x82Ă\xA2\x82܂\xB7\x81BRFC4250\x82Ƀ\x81\x83b\x83Z\x81[\x83W\x94ԍ\x86\x82̈ꗗ\x82\xAA\x82\xA0\x82\xE8\x82܂\xB7\x81B\x83\x81\x83b\x83Z\x81[\x83W\x96\xBC\x82\xCD"SSH2_MSG_xxxx"\x82Ƃ\xA2\x82\xA4\x83l\x81[\x83~\x83\x93\x83O\x82ɂȂ\xC1\x82Ă\xA8\x82\xE8\x81ATTSSH\x93\xE0\x95\x94\x82ł\xE0\x93\xAF\x82\xB6\x96\xBC\x91O\x82Ń}\x83N\x83\x8D\x92\xE8\x8B`\x82\xB5\x82Ă\xA2\x82܂\xB7\x81B<br> +\x81 @ SSH\x82͒ʐM\x8Co\x98H\x82\xF0\x88Í\x86\x89\xBB\x82\xB7\x82邱\x82Ƃ\xAA\x82ł\xAB\x82\xE9\x82̂\xAA\x93\xC1\x92\xA5\x82ł\xB7\x82\xAA\x81A\x83p\x83P\x83b\x83g\x82̈Í\x86\x89\xBB\x82\xF0\x8Ds\x82\xA4\x82\xBD\x82߂ɂ́u\x8C\xAE\x81v\x82\xAA\x95K\x97v\x82ł\xB7\x81B\x92ʐM\x8Co\x98H\x82̈Í\x86\x89\xBB\x82ɂ́A\x8B\xA4\x92ʌ\xAE\x82ɂ\xE6\x82鋤\x92ʌ\xAE\x88Í\x86\x82\xAA\x97\x98\x97p\x82\xB3\x82\xEA\x82܂\xB7\x81B\x8C\xF6\x8AJ\x8C\xAE\x88Í\x86\x82̂ق\xA4\x82\xAA\x83Z\x83L\x83\x85\x83\x8A\x83e\x83B\x8B\xAD\x93x\x82͍\x82\x82\xA2\x82̂ł\xB7\x82\xAA\x81A\x88Í\x86\x8F\x88\x97\x9D\x82ɑ\xBD\x91\xE5\x82Ȏ\x9E\x8AԂ\xAA\x82\xA9\x82\xA9\x82邽\x82߁ASSH\x82̂悤\x82ȒʐM\x90\xAB\x94\\x82\xAA\x97v\x8B\x81\x82\xB3\x82\xEA\x82邵\x82\xAD\x82݂ł͍̗p\x82\xB3\x82\xEA\x82܂\xB9\x82\xF1\x81BSSH2\x82ł́A\x8B\xA4\x92ʌ\xAE\x88Í\x86\x83A\x83\x8B\x83S\x83\x8A\x83Y\x83\x80\x82Ƃ\xB5\x82āAAES(Advanced Encryption Standard\x81FRijndael\x83A\x83\x8B\x83S\x83\x8A\x83Y\x83\x80)\x82\xE23DES(Tri ple DES)\x82Ȃǂ\xAA\x97\x98\x97p\x82\xB3\x82\xEA\x82܂\xB7\x81B<br> +\x81@\x8B\xA4\x92ʌ\xAE\x82͒ʐM\x82\xF0\x8Ds\x82\xA4\x93\xF1\x8EҊԂł݂̂ɋ\xA4\x97L\x82\xB3\x82\xEA\x82\xE9\x8F\xEE\x95\xF1\x82ł\xA0\x82\xE8\x81A\x91\xE6\x8EO\x8E҂ɒm\x82\xE7\x82\xEA\x82Ă͂Ȃ\xE8\x82܂\xB9\x82\xF1\x81BSSH2\x82ł́A\x83N\x83\x89\x83C\x83A\x83\x93\x83g\x82\xAA\x83\x8A\x83\x82\x81[\x83g\x83z\x83X\x83g\x81iSSH\x83T\x81[\x83o\x81j\x82\xD6TCP\x90ڑ\xB1\x82\xB5\x82\xBD\x8E\x9E\x82ɁA"Diffie-Hellman"\x83A\x83\x8B\x83S\x83\x8A\x83Y\x83\x80\x82\xF0\x83x\x81[\x83X\x82Ƃ\xB5\x82\xBD\x93Ǝ\xA9\x82̕\xFB\x8E\xAE\x82ɂ\xE6\x82\xE8\x81A\x83N\x83\x89\x83C\x83A\x83\x93\x83g\x82ƃT\x81[\x83o\x82ł\xB5\x82\xA9\x92m\x82蓾\x82Ȃ\xA2\x8B\xA4\x92ʌ\xAE\x82\xF0\x8B\xA4\x97L\x82\xB5\x82܂\xB7\x81BDH\x8C\xAE\x8B\xA4\x97L\x82\xAA\x8A\xAE\x97\xB9\x82\xB7\x82\xE9\x82܂ł̉ߒ\xF6\x82́A\x83l\x83b\x83g\x83\x8F\x81[\x83N\x8F\xE3\x82\xF0\x83p\x83P\x83b\x83g\x82\xAA\x95\xBD\x95\xB6\x82ŗ\xAC\x82\xEA\x82邽\x82߁A\x91\xE6\x8EO\x8E҂ɂ\xE6\x82\xE9\x83p\x83P\x83b\x83g\x83L\x83\x83\x83v\x83`\x83\x 83\x82\xAA\x89\\x82ƂȂ\xC1\x82Ă\xA2\x82܂\xB7\x82\xAA\x81A\x83p\x83P\x83b\x83g\x82\xF0\x94`\x82\xA9\x82\xEA\x82Ă\xE0\x81A\x8B\xA4\x92ʌ\xAE\x82͗\x9D\x98_\x8F\xE3\x91\xE6\x8EO\x8E҂ɂ͕\xAA\x82\xA9\x82\xE7\x82Ȃ\xA2\x82悤\x82ɂȂ\xC1\x82Ă\xA2\x82܂\xB7\x81B<br> +\x81@\x8B\xA4\x92ʌ\xAE\x82\xAA\x8B\xA4\x97L\x82ł\xAB\x82\xBD\x82\xA0\x82Ƃ́A\x82\xBB\x82̌\xAE\x82\xF0\x8Eg\x82\xC1\x82ăp\x83P\x83b\x83g\x82\xF0\x88Í\x86\x89\xBB\x82\xB5\x82܂\xB7\x81BSSH2\x82ł́A\x91\x97\x8E\xF3\x90M\x82\xB3\x82\xEA\x82\xE9\x83p\x83P\x83b\x83g\x82͎\xED\x97ނ\xAA\x82\xA0\x82邽\x82߁A\x82\xBB\x82ꂼ\x82\xEA\x82Ɂu\x83\x81\x83b\x83Z\x81[\x83W\x94ԍ\x86\x81v\x82\xF0\x8A\x84\x82\xE8\x90U\x82\xC1\x82Ă\xA2\x82܂\xB7\x81BRFC4250\x82Ƀ\x81\x83b\x83Z\x81[\x83W\x94ԍ\x86\x82̈ꗗ\x82\xAA\x82\xA0\x82\xE8\x82܂\xB7\x81B\x83\x81\x83b\x83Z\x81[\x83W\x96\xBC\x82\xCD"SSH2_MSG_xxxx"\x82Ƃ\xA2\x82\xA4\x83l\x81[\x83~\x83\x93\x83O\x82ɂȂ\xC1\x82Ă\xA8\x82\xE8\x81ATTSSH\x93\xE0\x95\x94\x82ł\xE0\x93\xAF\x82\xB6\x96\xBC\x91O\x82Ń}\x83N\x83\x8D\x92\xE8\x8B`\x82\xB5\x82Ă\xA2\x82܂\xB7\x81B<br> \x81@\x88ȉ\xBA\x82ɁA\x83N\x83\x89\x83C\x83A\x83\x93\x83g\x82\xA9\x82\xE7\x83T\x81[\x83o\x82\xD6TCP\x90ڑ\xB1\x81i\x83|\x81[\x83g22\x94ԁj\x82\xB5\x82Ă\xA9\x82\xE7\x81A\x83p\x83X\x83\x8F\x81[\x83h\x94F\x8FŃ\x86\x81[\x83U\x94F\x8F\xB3\x82\xEA\x82\xE9\x82܂ł̗\xAC\x82\xEA\x82\xF0\x8E\xA6\x82\xB5\x82܂\xB7\x81B<br> Modified: branches/4-stable/doc/ja/html/usage/ssh.html =================================================================== --- branches/4-stable/doc/ja/html/usage/ssh.html 2022-11-26 08:40:33 UTC (rev 10381) +++ branches/4-stable/doc/ja/html/usage/ssh.html 2022-11-26 12:06:44 UTC (rev 10382) @@ -22,7 +22,8 @@ </p> <p> - \x82܂\xBD\x81ASSH \x82̐ڑ\xB1\x95\xFB\x96@\x82ɂ\xCD + \x82܂\xBD\x81ASSH \x82̔F\x8Fؕ\xFB\x8E\xAE\x82ɂ\xCD + </p> <ul> <li>\x83p\x83X\x83\x8F\x81[\x83h\x94F\x8F\xD8</li> <li>\x8C\xF6\x8AJ\x8C\xAE\x81i\x82Ɣ閧\x8C\xAE\x82̃y\x83A\x82ɂ\xE6\x82\xE9\x81j\x94F\x8F\xD8 @@ -32,8 +33,9 @@ </li> <li>SSH1 \x82ɂ\xA8\x82\xAF\x82\xE9 rhosts \x94F\x8F\xD8</li> <li>SSH1 \x82ɂ\xA8\x82\xAF\x82\xE9 challenge/response(TIS) \x94F\x8F\xD8</li> - <li>SHS2 \x82ɂ\xA8\x82\xAF\x82\xE9 keyboard-interactive \x94F\x8F\xD8</li> + <li>SHS2 \x82ɂ\xA8\x82\xAF\x82\xE9 keyboard-interactive \x94F\x8F\xD8</li> </ul> + <p> \x82\xAA\x82\xA0\x82\xE8\x82܂\xB7\x81B\x82\xB1\x82\xB1\x82ł͎\xF9\x97v\x82\xAA\x91\xBD\x82\xA2\x82Ǝv\x82\xED\x82\xEA\x82\xE9\x94F\x8Fؕ\xFB\x96@\x82ɂ\xA2\x82ĐG\x82ꂽ\x82\xA2\x82Ǝv\x82\xA2\x82܂\xB7\x81B </p> @@ -40,26 +42,26 @@ <h2 id="connproc">\x90ڑ\xB1\x82̎菇</h2> <p> - Tera Term \x82\xF0\x8BN\x93\xAE\x82\xB7\x82\xE9\x82ƁA\x89\xBA\x90}\x82̂悤\x82ȃ_\x83C\x83A\x83\x8D\x83O\x82ɂ\xE6\x82胍\x83O\x83C\x83\x93\x95\xFB\x96@\x82\xF0\x91I\x82Ԃ\xB1\x82Ƃ\xAA\x82ł\xAB\x82܂\xB7\x81B + Tera Term \x82\xF0\x8BN\x93\xAE\x82\xB7\x82\xE9\x82ƁA\x89\xBA\x90}\x82̂悤\x82ȃ_\x83C\x83A\x83\x8D\x83O\x82ɂ\xE6\x82\xE8\x90ڑ\xB1\x95\xFB\x96@\x82\xF0\x91I\x82Ԃ\xB1\x82Ƃ\xAA\x82ł\xAB\x82܂\xB7\x81B </p> <div class="img"><img src="../image/NewConnection.png" alt="\x90ڑ\xB1\x83_\x83C\x83A\x83\x8D\x83O"></div> <p> - SSH \x82Őڑ\xB1\x82\xB7\x82\xE9\x8Fꍇ\x81A\x83f\x83t\x83H\x83\x8B\x83g\x82\xA9\x82\xE7\x95ύX\x82\xB7\x82\xE9\x89ӏ\x8A\x82́uSSH version\x81v\x82ł\xB7\x81B\x90ڑ\xB1\x90\xE6\x82̃T\x81[\x83o\x82ɂ\xA0\x82킹\x82đI\x91\xF0\x82\xB5\x82Ă\xAD\x82\xBE\x82\xB3\x82\xA2\x81B + SSH \x82Őڑ\xB1\x82\xB7\x82\xE9\x8Fꍇ\x81A\x90ڑ\xB1\x90\xE6\x82̃T\x81[\x83o\x82ɂ\xA0\x82킹\x82āuSSH version\x81v\x82\xF0\x91I\x91\xF0\x82\xB5\x82Ă\xAD\x82\xBE\x82\xB3\x82\xA2\x81B </p> <p id="ssh_auth_dialog"> \x90ڑ\xB1\x82\xB7\x82\xE9\x82ƁA\x8D\xA1\x93x\x82͔F\x8Fؕ\xFB\x96@\x82\xF0\x91I\x91\xF0\x82\xB7\x82\xE9\x83_\x83C\x83A\x83\x8D\x83O\x82\xAA\x8C\xBB\x82\xEA\x82܂\xB7\x81B<br /> - \x83f\x83t\x83H\x83\x8B\x83g\x92l\x82\xF0<a href="../menu/setup-sshauth.html">"TTSSH: Authentication Setup" \x83_\x83C\x83A\x83\x8D\x83O\x83{\x83b\x83N\x83X</a>\x82Őݒ肷\x82邱\x82Ƃ\xAA\x82ł\xAB\x82܂\xB7\x81B + \x82\xB1\x82̃_\x83C\x83A\x83\x8D\x83O\x82̃f\x83t\x83H\x83\x8B\x83g\x92l\x82\xCD <a href="../menu/setup-sshauth.html">"TTSSH: Authentication Setup" \x83_\x83C\x83A\x83\x8D\x83O\x83{\x83b\x83N\x83X</a>\x82Őݒ肷\x82邱\x82Ƃ\xAA\x82ł\xAB\x82܂\xB7\x81B </p> <div class="img"><img src="../image/Authentication.png" alt="\x94F\x8Fؕ\xFB\x96@"></div> <p> TTSSH \x82͕\xA1\x90\x94\x82̔F\x8Fؕ\xFB\x96@\x82\xF0\x83T\x83|\x81[\x83g\x82\xB5\x82Ă\xA2\x82܂\xB7\x82\xAA\x81A\x96\xBE\x8E\xA6\x93I\x82Ɉ\xEA\x82̔F\x8Fؕ\xFB\x96@\x82\xF0\x91I\x91\xF0\x82\xB7\x82\xE9\x95K\x97v\x82\xAA\x82\xA0\x82\xE8\x82܂\xB7\x81B\x88\xEA\x82̔F\x8Fؕ\xFB\x96@\x82Ɏ\xB8\x94s\x82\xB5\x82\xBD\x8Fꍇ\x81A\x91\xB1\x82\xAF\x82ĕʂ̎\xED\x97ނ̔F\x8F\xF0\x8E\x8E\x82݂邱\x82Ƃ͂\xA0\x82\xE8\x82܂\xB9\x82\xF1\x81B<br> - \x82\xBD\x82Ƃ\xA6\x82\xCE OpenSSH \x83N\x83\x89\x83C\x83A\x83\x93\x83g\x82ł̓p\x83X\x83\x8F\x81[\x83h\x94F\x8F\xC6 keyboard-interactive \x94F\x8F̌\xA9\x82\xBD\x96ڂ\xAA\x82\xBB\x82\xA4\x95ς\xED\x82\xE7\x82Ȃ\xA2\x82\xBD\x82߃T\x81[\x83o\x82̔F\x8Fؕ\xFB\x8E\xAE\x82\xF0\x88ӎ\xAF\x82\xB9\x82\xB8\x82Ƀ\x8D\x83O\x83C\x83\x93\x82ł\xAB\x82܂\xB7\x82\xAA\x81ATTSSH \x82͂\xBB\x82\xA4\x82ł͂\xA0\x82\xE8\x82܂\xB9\x82\xF1\x81Bkeyboard-interactive \x94F\x8Fƌ\xF6\x8AJ\x8C\xAE\x94F\x8F\xF0\x83T\x83|\x81[\x83g\x82\xB5\x82Ă\xA2\x82\xE9\x83T\x81[\x83o\x82Ƀp\x83X\x83\x8F\x81[\x83h\x94F\x8FŃ\x8D\x83O\x83C\x83\x93\x82\xB5\x82悤\x82Ƃ\xB5\x82Ă\xE0\x95K\x82\xB8\x8E\xB8\x94s\x82\xB5\x82܂\xB7\x81B + \x82\xBD\x82Ƃ\xA6\x82\xCE OpenSSH \x83N\x83\x89\x83C\x83A\x83\x93\x83g\x82ł̓p\x83X\x83\x8F\x81[\x83h\x94F\x8F\xC6 keyboard-interactive \x94F\x8F̌\xA9\x82\xBD\x96ڂ\xAA\x82\xBB\x82\xA4\x95ς\xED\x82\xE7\x82Ȃ\xA2\x82\xBD\x82߃T\x81[\x83o\x82̔F\x8Fؕ\xFB\x8E\xAE\x82\xF0\x88ӎ\xAF\x82\xB9\x82\xB8\x82Ƀ\x8D\x83O\x83C\x83\x93\x82ł\xAB\x82܂\xB7\x82\xAA\x81ATTSSH \x82͂\xBB\x82\xA4\x82ł͂\xA0\x82\xE8\x82܂\xB9\x82\xF1\x81Bkeyboard-interactive \x94F\x8Fƌ\xF6\x8AJ\x8C\xAE\x94F\x8F\xBE\x82\xAF\x82\xF0\x83T\x83|\x81[\x83g\x82\xB5\x82Ă\xA2\x82\xE9\x83T\x81[\x83o\x82Ƀp\x83X\x83\x8F\x81[\x83h\x94F\x8FŃ\x8D\x83O\x83C\x83\x93\x82\xB5\x82悤\x82Ƃ\xB5\x82Ă\xE0\x95K\x82\xB8\x8E\xB8\x94s\x82\xB5\x82܂\xB7\x81B </p> <ul> <li>\x83p\x83X\x83\x8F\x81[\x83h\x94F\x8F\xF0\x8Eg\x97p\x82\xB7\x82\xE9\x8Fꍇ\x82́uUse plain password to log in\x81v\x82Ƀ`\x83F\x83b\x83N\x82\xAA\x82\xA2\x82Ă\xA2\x82邱\x82Ƃ\xF0\x8Am\x94F\x82\xB5\x81A\x83\x86\x81[\x83U\x96\xBC\x82ƃp\x83X\x83\x8F\x81[\x83h\x82\xF0\x93\xFC\x97͂\xB5\x82܂\xB7\x81B\x82\xB1\x82\xEA\x82炪\x90\xB3\x82\xB5\x82\xAF\x82\xEA\x82Ζ\xB3\x8E\x96\x83\x8D\x83O\x83C\x83\x93\x82ł\xAB\x82܂\xB7\x81B<br> \x81\xA6\x83p\x83X\x83\x8F\x81[\x83h\x91\x97\x90M\x8E\x9E\x82\xCC SSH \x83p\x83P\x83b\x83g\x82͈Í\x86\x89\xBB\x82\xB3\x82\xEA\x82Ă\xA2\x82\xE9\x82̂ŁATELNET \x82̂悤\x82Ƀp\x83X\x83\x8F\x81[\x83h\x82\xAA\x95\xBD\x95\xB6\x82ő\x97\x90M\x82\xB3\x82\xEA\x82邱\x82Ƃ͂\xA0\x82\xE8\x82܂\xB9\x82\xF1\x81B</li> - <li>\x8C\xF6\x8AJ\x8C\xAE\x94F\x8F\xF0\x97p\x82\xA2\x82\xE9\x8Fꍇ\x82́A\x8Fォ\x82\xE72\x94Ԗڂ́uUse RSA/DSA/ECDSA/ED25519 key to log in\x81v\x82Ƀ`\x83F\x83b\x83N\x82\xF0\x82\xAF\x81A\x81uPrivate key file:\x81v\x83{\x83^\x83\x93\x82\xF0\x89\x9F\x82\xB5\x82Ĕ閧\x83L\x81[\x82̃t\x83@\x83C\x83\x8B\x82\xF0\x8Ew\x92肵\x82܂\xB7\x81B\x82\xBB\x82̌テ\x81[\x83U\x96\xBC\x82Ɣ閧\x83L\x81[\x82̃p\x83X\x83t\x83\x8C\x81[\x83Y\x82\xF0\x93\xFC\x97͂\xB5\x82ă\x8D\x83O\x83C\x83\x93\x82\xB5\x82܂\xB7\x81B<br> + <li>\x8C\xF6\x8AJ\x8C\xAE\x94F\x8F\xF0\x97p\x82\xA2\x82\xE9\x8Fꍇ\x82́A\x8Fォ\x82\xE72\x94Ԗڂ́uUse RSA/DSA/ECDSA/ED25519 key to log in\x81v\x82Ƀ`\x83F\x83b\x83N\x82\xF0\x82\xAF\x81A\x81uPrivate key file:\x81v\x83{\x83^\x83\x93\x82\xF0\x89\x9F\x82\xB5\x82Ĕ閧\x8C\xAE\x82̃t\x83@\x83C\x83\x8B\x82\xF0\x8Ew\x92肵\x82܂\xB7\x81B\x82\xBB\x82̌テ\x81[\x83U\x96\xBC\x82Ɣ閧\x8C\xAE\x82̃p\x83X\x83t\x83\x8C\x81[\x83Y\x82\xF0\x93\xFC\x97͂\xB5\x82ă\x8D\x83O\x83C\x83\x93\x82\xB5\x82܂\xB7\x81B<br> \x81\xA6OpenSSH \x8C`\x8E\xAE\x82̂ق\xA9\x81ATTSSH 2.63(Tera Term 4.76) \x88ȍ~\x82ł\xCD PuTTY \x8C`\x8E\xAE\x81ESECSH(ssh.com) \x8C`\x8E\xAE\x82\xCC SSH2 \x94閧\x8C\xAE\x82ɑΉ\x9E\x82\xB5\x82Ă\xA2\x82܂\xB7\x81B</li> <li>keyboard-interactive\x94F\x8F\xF0\x8Eg\x97p\x82\xB7\x82\xE9\x8Fꍇ\x82́uUse keyboard-interactive to log in\x81v\x82Ƀ`\x83F\x83b\x83N\x82\xF0\x82\xAF\x81A\x83\x86\x81[\x83U\x96\xBC\x82\xF0\x93\xFC\x97͂\xB5\x82܂\xB7\x81B<br> \x83T\x81[\x83o\x82\xA9\x82\xE7\x82̃v\x83\x8D\x83\x93\x83v\x83g\x82ƕ\xB6\x8E\x9A\x97\xF1\x82\xF0\x93\xFC\x97͂\xB7\x82\xE9\x83_\x83C\x83A\x83\x8D\x83O\x82\xAA\x95\\x8E\xA6\x82\xB3\x82\xEA\x82\xE9\x82̂ŁA\x83p\x83X\x83\x8F\x81[\x83h\x82\xF0\x93\xFC\x97͂\xB5\x82܂\xB7\x81B</li>