Product SiteDocumentation Site

3.2. SSH Vs. Telnet

When using a network connection, essential and complex communication protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) take place mostly "behind-the-scenes" and are hidden beneath the user interface. Below the difference between Telnet's insecure, clear-text authentication and the encrypted authentication used by OpenSSH is shown by capturing and analyzing some of the underlying data transfer.
The following image shows a sample packet of connecting to a host via Telnet. Note that the password, password1, is clearly displayed in the data stream. This could easily expose the password to anybody analyzing the raw data on the network, leaving a host and its services vulnerable to attack.
Compare the above image to the following image, which is a sample of connecting via OpenSSH. As OpenSSH uses encryption when providing credentials, the output is scrambled and is incomprehensible to anybody analyzing the raw packet data.
This feature alone is the main reason why utilities such as telnet and rlogin are considered insecure and outdated. Providing encryption before credentials are sent, OpenSSH can allow for stronger security when communicating over any network, but most importantly over unknown, or untrusted ones.