Secure Shell (SSH) and SFTP

When remotely connecting to another computer or transferring files between computers, it is necessary to use encryption in order to protect usernames, passwords, and other sensitive information. This requires the use of secure protocols:

  • Secure Shell (SSH) creates a secure connection when you log in to a remote computer.
  • Secure File Transfer Protocol (SFTP) uses SSH and provides a secure way to transfer files between computers.

You must use SSH or SFTP when connecting to the University's UNIX Timesharing Service.

Windows

PuTTY is a program that enables you to establish a secure SSH connection to the UNIX Timesharing Service. A program called WinSCP can be used to establish an SFTP connection. Other commercial and open source packages are also available.

Mac

Macs have a built-in SSH client that can be used to access the UNIX Timesharing Service. Macs also have a built-in SFTP capability that can be used to access the UNIX Timesharing Service, or you can use an SFTP program called Fetch. Other commercial and open source packages are also available.

Linux

Linux has a built-in SSH client that can be used to access the UNIX Timesharing Service. Many Linux systems also include an SFTP client called gFTP. Other commercial and open source packages are also available.

Note:  Enterprise Network Firewalls, which are required to protect file servers and workstations in University Departments, allow secure protocols on port 22. They block ports that use insecure protocols, including ports 21 and 25. Insecure protocols include rlogin (remote login), TELNET, rcp (remote copy), and ftp (file transfer).

Tags: Secure Shell Secure FTP