5

Let's say I use this command:

ssh -vvv user@server

I get an output similar to this:

send packet: type 21
ssh_set_newkeys: mode 1
receive packet: type 6
SSH2_MSG_SERVICE_ACCEPT received
receive packet: type 51
Permission denied (publickey,password)
  • What are all these packet-types?
  • Where can I read and learn about them? I always google something like ssh packet type51, but there must be a place where all the types are listed
  • If you know how to understand this ssh verbose mode, where did you learn this?


Thanks for your help :)

0

1 Answer 1

7

SSH is defined in IETF RFCs like

In general the places to find out how things work are IEEE standards and IETF RFCs. They're not the easiest read, the language takes a bit of getting used to.

To find resources of learning how to use/understand SSH you can search the internet. There's a multitude of websites for this. You can also buy a book from publishers like O'Reilly - those tend to be thick, but are also very comprehensive.

That gives you the theoretical background. In the end you gain practical knowledge only in practical situations. I.e. you learn how to interpret SSH logs by analyzing SSH logs :-)

See also IANA "SSH Parameters" -page with direct links to the applicable RFCs.

Techtarget's 5-part SSH tutorial

NOTE: These links are applicable for SSH-2, accepted as standard 2006. It's a complete re-write, and incompatible with original SSH-1, which was published 1996 and not much in use nowadays.

2
  • Sorry I don't have enough reputation to upvote you yet, but thanks. This was exactly what I was looking for :) Also I have found a book from O'Reilly, but it is like really old. Should I still consider buying this book? Commented Feb 4, 2023 at 11:56
  • De nada mate, that's what this community is for - sharing knowledge. I dinna know abt the IANA page myself :-) As for the book - that depends on how old is "really old". Original SSH-1 dates from 1996, SSH-2 was adopted as standard 2006. The links are for v2. If the book is pre-06, it's basically useless as v2 is an incompatible re-write of v1. Techtarget explains the differences here: techtarget.com/searchsecurity/tip/An-introduction-to-SSH2 - that's the last section of their 5-part tutorial; well worth the read. If the book applies to v2 it should be OK. Commented Feb 4, 2023 at 12:22

You must log in to answer this question.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.