What is an SSH Port Number? [Default SSH port]

They want to deliver vast amounts of information over the internet. And again, the internet is not something you just dump something on. It’s not a truck. It’s a series of tubes.” – Senator Ted Stevens.

When Senator Ted Stevens gave that quote during a debate on Net Neutrality in 2006, it became an internet sensation. Memes have been made on it, and it has a Wikipedia page. 

As ridiculous as it may sound, that’s how networks work. It’s a series of tubes we can’t see connecting devices and servers. 

We focus on understanding what these tubes are and how they connect to our focus of discussion, the Secure Shell Protocol.

Before diving into the SSH port number, we must define a couple of terminologies.

Port: You may be tempted to think ports are physical connections that join two devices.

Ports are actually a logical connection that programs and services use to exchange information. You can’t see them, but they’re responsible for the web pages and email messages you see. 

Ports have numbers ranging from 0-65535. More common examples are 

  • Port 80 for web pages (HTTP)
  • Port 443 for web pages (HTTPS)
  • Port 25 for emails
  • Port 22 for SSH
  • Port 21 for FTP (File Transfer Protocol).

Ports have IP addresses attached to them. The IP address is for identification purposes. It helps in locating the server you want to use.

The IP address of Google, for example, is 215.114.85.17. So, when you enter the domain name of Google on a web browser, the IP address is what is located alongside port number 80. The port number “80” shows you’re trying to access the webpage. 

So, the tube that connects your device to the Google server is 215.114.85.17:80. This is what your device works with to bring the Google website to you.

One of the skills needed to use these ports is command-line knowledge. If you don’t have such a skill set, don’t worry, it’s pretty easy to understand.

Telnet: In the 1960s, people could access and manipulate servers remotely through a protocol called “Telnet.” 

During the 1960s, no mobile devices or sophisticated computers were available for public use. Telnet is a set of commands that help you communicate with other computers. 

The problem was that it needed to be more secure. Anyone could intercept your information. Therefore, the information wasn’t safe. For the security of information, SSH was invented.

What is SSH?

It is an acronym for Secure Shell. It’s a protocol that helps you access a server over the public internet in a secure way. 

So, you don’t have to worry about your information being monitored or hacked when you use SSH. 

SSH creates a cryptographic password and public authentication key for your data before sending it to a server. It’s always encrypted before being sent through the public network.

In summary;

  • It is a technique and a protocol designed to connect the client and server in a safe manner remotely. 
  • As a protocol, it facilitates data transmission from the client to the server. Before transmission, the system encrypts all data, which it then decrypts at the other end. 
  • All SSH connections and network-based communications between two devices (wired or wireless) must open a port.

History of SSH

SSH was first designed in 1995 by Tatu Ylönen. He was a researcher at the Helsinki University of Technology. He later started SSH Communications Security, located in Finland, specializing in cybersecurity.

The first version of SSH, SSH-1, had various flaws that required an updated version, SSH-2, to be created. Today, SSH-1 is rarely in use.

SSH-2 is the current version of the Secure Shell protocols. It has been adopted by the Internet Engineering Task Force (IETF) as a Standards Track specification since 2006.

There have been no reports of any vulnerable security issues with SSH-2, although there are reports that the National Security Agency (NSA) can decrypt some SSH traffic. A leak proposed this information from Edward Snowden in 2013.

SSH features

Secures Login Details

Telnet usually transfers your username and password through the public network as plain text. This leaves your private information open to malicious third parties on the internet. SSH encrypts your data before it leaves your local computer. So, your login session is encrypted as it transfers from client to server.

Single Secure Copy

When you want to transfer files between two accounts, SSH helps you encrypt your file. It does this through the single Secure Copy command, which automatically encrypts the file as it leaves your account and decrypts it as it enters the receiver’s account.

Keys and Authentication agents

Having multiple accounts on multiple computers can be a security risk. It is very tedious to memorize multiple usernames and passwords. It’s possible to mistakenly type your password into your username, leaking your password to the public. SSH helps you to avoid such by providing keys with an authentication feature. These agents help you authenticate all your accounts without memorizing multiple passwords and usernames.

Controlling of Access To Account

SSH allows you also to control how much access one has to your account. For example, you can be able to set up restricted access to your account. You can set up a read-only control for people who want to access your account without revealing your password. You can also give editing options to trusted people. In short, you can control how much control one has over your account, and you can do it remotely.

How Does SSH Work?

In simple terms, SSH works with public key pairs. It can also be called Asymmetric Cryptography and helps to authenticate hosts between a host and a server. 

Imagine that you want to send information to a neighboring server. What SSH does is assign a key to the data sent. The data transfers to the neighboring server and assigns a public key to it too. The data is sent back to you, and your key is removed and sent back to the neighboring server, which removes the key and accesses the data.

The advantage of this protocol is that your information is encrypted throughout transit through the internet. Therefore, any information sent through the protocol is secure from third parties. Your password details are safe.

To make a connection to a remote host, you can easily use the SSH command below;

ssh [email protected]

The client will connect to the server [server.example.com] using the user ID [UserName]. Public key pairs are more typically used to authenticate hosts to one another than a traditional user ID and password, even though both can be used to access SSH.

When we work on the SSH protocol, three steps are often noted;

  1. Establishing an SSH connection.
  2. Session encryption negotiation.
  3. User authentication.

What is the SSH port number?

The default SSH port number is 22. It is a common trend amongst client users to open up the port for the public internet. Such actions imply that the ports are a target for malicious hackers to steal information and use it for nefarious purposes.

Because of such risks, changing the port number from the default number is advisable. It would prevent SSH passwords from brute-force attacks.

How to Change your Default SSH port

There are certain things to take note of before changing the default SSH fault:

  • Use a 4 or 5-digit port. We recommend a random port number between 1024 and 65535.
  • Make sure to note the port number that you’re using.
  • If the data center network uses a firewall, inform the data center of the desired port to open it.
  • Be careful when you change the port number, as the file can be lost if there is any wrong move. 
  • You can always make a duplicate before you start the process as a failsafe.

Below are the steps to changing the default port number:

Step 1: Backup with this command;

UserName@Server:~$ cp/etc/ssh/sshd_config /etc/ssh/sshd_config_backup

Step 2: Now, a copy of the file has been created in the same directory. The default SSH port is to be changed. Access the ssh_config file through this command;

UserName@Server:~$gedit/etc/ssh/sshd_config

You can perform this command on any editor.

Step 3: The command causes the file to open in a text editor. The line of code needed is;

#Port 22

Step 4: Change the port number to any random 4 or 5-digit value between 1024 and 65535. We’ll be using 2434 in this example. Delete the # sign and substitute 22 for the desired number. It should look like this;

Port 2434

Step 5: Add this port to your firewall’s whitelist. After that, restart SSH. Write this command for the restart to take effect;

UserName@server:~$ sudo service ssh restart

Slighter modifications may appear when you want to work on Centos or Fedora;

UserName@server:$ sudo service sshd restart

Step 6: Try using the new SSH port number in a new terminal window while remaining logged in as root. Verify your settings if the login doesn’t work. Do not end your open root session until you can log in with the updated setup.

Conclusion

Internet pioneers created a protocol bridging the gap between servers and users communicating. A couple started appearing in the 1960s, but SSH, an acronym for Secure Shell or Secure Socket Shell, has been the Pinnacle of network security for users. SSH-2 is the best, and its default port number is 22. Because of the vulnerabilities that come with using the default port number, it is advisable to change them. This protocol adds an extra layer of security to your client-to-server connections, freeing you from worries of cyber-crimes.

Related Post

How To Install Kali Linux – A Step-by-Step

There are many operating systems you could install on a...

How to Push and Pull a Docker Image from Dock

Docker is an open-source platform that enables develope...

How to Install PHP Dependencies on Docker

As a web developer, you're likely no stranger to the im...

How To Setup a TeamSpeak 3 Server on Windows

TeamSpeak 3 is a voice-over-internet protocol (VoIP) ap...

How to Run Speed Test in The VPS (Terminal) A

In today's digital era, Virtual Private Servers (VPS) h...

How to Test Disk Speed Using the Linux Comman

In today's fast digital world, how fast your computer's...

Leave a Comment