Network Security Features of HP-UX 11i v1 and 11i v2

Page 18
SSH-1 and SSH-2 support: HP-UX Secure Shell supports both IETF protocols. However, HP
recommends the use of the more secure SSH-2 protocol to prevent the possibility of an insertion
attack.
Diverse authentication support: HP-UX Secure Shell supports password based, public key based,
Kerberos, and host based authentication schemes. Since HP-UX Secure Shell encrypts passwords,
password based authentication can prevent password sniffing and dictionary attacks. With public key
authentication, HP-UX Secure Shell keeps a public key that resides on all servers, and a private key
that remains on the client and is protected by a passphrase.