Abstract
Technology called Ajax gives web applications the functionality and operability of desktop applications. In this study, we propose and implement a Secure Shell (SSH) client system using Ajax, independent of the OS or Java execution environment. In this system, SSH packets are generated on a web browser by using JavaScript and a web server works as a proxy in communication with an SSH server to realize end-to-end SSH communication. We implemented a prototype program and confirmed by experiment that it runs on several web browsers and mobile phones. This system has enabled secure SSH communication from a PC at an Internet cafe or any mobile phone. By measuring the processing performance, we verified satisfactory performance for emergency use, although the speed was unsatisfactory in some cases with mobile phone. The system proposed in this study will be effective in various fields of E-Business.
Chapter PDF
References
Google Map, http://maps.google.com/maps
W3C Working Draft, The XMLHttpRequest Object, http://www.w3.org/TR/XMLHttpRequest/
Mozilla Japan, http://www.mozilla-japan.org/projects/security/components/same-origin.html
Barrett, D.J., Silverman, R.E., Byrne, R.G.: SSH, the Secure Shell The Definitive Guide, 2nd edn. O’Reilly, Sebastopol (2005)
Ajaxterm, http://antony.lesuisse.org/qweb/trac/wiki/AjaxTerm
Ylonen, T.: The SSH (Secure Shell) Remote Login Protocol, http://www.graco.c.u-tokyo.ac.jp/~nishi/security/ssh/RFC
The Secure Shell (SSH) Protocol Assigned Numbers, http://www.ietf.org/rfc/rfc4250.txt
The Secure Shell (SSH) Protocol Architecture, http://www.ietf.org/rfc/rfc4251.txt
The Secure Shell (SSH) Authentication Protocol, http://www.ietf.org/rfc/rfc4252.txt
The Secure Shell (SSH) Transport Layer Protocol, http://www.ietf.org/rfc/rfc4253.txt
The Secure Shell (SSH) Connection Protocol, http://www.ietf.org/rfc/rfc4254.txt
Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints, http://www.ietf.org/rfc/rfc4255.txt
Generic Message Exchange Authentication for the Secure Shell Protocol (SSH), http://www.ietf.org/rfc/rfc4256.txt
The Secure Shell (SSH) Transport Layer Encryption Modes, http://www.ietf.org/rfc/rfc4344.txt
Yoshiura, H., Shigematsu, T., Susaki, S., Saitoh, T., Toyoshima, H., Kurita, C., Tezuka, S., Sasaki, R.: Authenticating Web-Based Virtual Shops Using Signature-Embedded Marks – A Practical Analysis. In: The 2000 Cambridge International Workshop on Security Protocols (2000) (in Cambridge)
Burnett, S., Paine, S.: RSA Security’s Official Guide to Cryptography. The McGraw- Hills Company, New York (2001)
JTA - Telnet/SSH for the JAVA(tm) platform, http://www.javassh.org/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kosuda, Y., Sasaki, R. (2009). Proposal and Implementation of SSH Client System Using Ajax. In: Godart, C., Gronau, N., Sharma, S., Canals, G. (eds) Software Services for e-Business and e-Society. I3E 2009. IFIP Advances in Information and Communication Technology, vol 305. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04280-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-04280-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04279-9
Online ISBN: 978-3-642-04280-5
eBook Packages: Computer ScienceComputer Science (R0)