{"id":13235,"date":"2020-05-27T16:26:47","date_gmt":"2020-05-27T14:26:47","guid":{"rendered":"https:\/\/www.ihs.com.tr\/blog\/?p=13235"},"modified":"2020-05-27T16:26:47","modified_gmt":"2020-05-27T14:26:47","slug":"ssh-nedir","status":"publish","type":"post","link":"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/","title":{"rendered":"SSH (Secure Shell) Nedir?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Secure Shell veya Secure Socket Shell olarak da bilinen <strong>SSH<\/strong>, kullan\u0131c\u0131lara, \u00f6zellikle sistem y\u00f6neticilerine, <strong>g\u00fcvenli olmayan bir a\u011f \u00fczerinden bir bilgisayara eri\u015fmek i\u00e7in g\u00fcvenli bir yol sa\u011flayan bir<\/strong><\/span><strong> a\u011f protokol\u00fcd\u00fcr<\/strong><span style=\"font-weight: 400;\"><strong>.<\/strong> G\u00fcvenli a\u011f hizmetleri sa\u011flaman\u0131n yan\u0131 s\u0131ra, <strong>SSH genel anlamda, SSH protokol\u00fcn\u00fc uygulayan yard\u0131mc\u0131 programlar grubununun tamam\u0131n\u0131 ifade eder.<\/strong> Secure Shell g\u00fc\u00e7l\u00fc bir parola <\/span><span style=\"font-weight: 400;\">do\u011frulamas\u0131<\/span><span style=\"font-weight: 400;\"> ve <\/span><strong>Public Key <\/strong><span style=\"font-weight: 400;\"><strong>(genel anahtar)<\/strong> do\u011frulamas\u0131 sa\u011flar, bunun yan\u0131 s\u0131ra internet gibi a\u00e7\u0131k bir a\u011f \u00fczerinden ba\u011flanan iki bilgisayar aras\u0131nda <\/span><span style=\"font-weight: 400;\">\u015fifrelenmi\u015f<\/span><span style=\"font-weight: 400;\"> veri ileti\u015fimi de sa\u011flar. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00fc\u00e7l\u00fc bir \u015fifreleme sa\u011flaman\u0131n yan\u0131 s\u0131ra <strong>SSH, a\u011f y\u00f6neticileri taraf\u0131ndan sistemleri ve uygulamalar\u0131 uzaktan y\u00f6netmek i\u00e7in de yayg\u0131n olarak kullan\u0131l\u0131r ve ki\u015filerin a\u011f \u00fczerinden ba\u015fka bir bilgisayarda oturum a\u00e7malar\u0131n\u0131, komutlar\u0131 y\u00f6netmelerini ve dosyalar\u0131 bir bilgisayardan di\u011ferine ta\u015f\u0131malar\u0131n\u0131 sa\u011flar.<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSH, hem \u015fifreleme a\u011f\u0131 protokol\u00fcn\u00fc hem de bu protokol\u00fc uygulayan yard\u0131mc\u0131 programlar grubunu ifade eder. SSH,\u00a0 oturumun g\u00f6r\u00fcnt\u00fclendi\u011fi bir u\u00e7 olan Secure Shell istemci uygulamas\u0131n\u0131, oturumun \u00e7al\u0131\u015ft\u0131\u011f\u0131 di\u011fer u\u00e7 olan bir SSH sunucusuna ba\u011flayan<\/span> <strong>istemci-sunucu (client server) modeli<\/strong><span style=\"font-weight: 400;\"><strong> ile \u00e7al\u0131\u015fmaktad\u0131r.<\/strong> SSH uygulamalar\u0131 genellikle terminal emulasyonu veya dosya aktar\u0131mlar\u0131 i\u00e7in kullan\u0131lan uygulama protokolleri i\u00e7in destek sunmaktad\u0131r. SSH, di\u011fer uygulama protokolleri i\u00e7in g\u00fcvenli t\u00fcneller olu\u015fturmak i\u00e7in de kullan\u0131l\u0131r, \u00f6rne\u011fin <\/span><strong>X Windows System<\/strong><span style=\"font-weight: 400;\"> grafiksel oturumlar\u0131n\u0131 uzaktan g\u00fcvenli bir \u015fekilde \u00e7al\u0131\u015ft\u0131rmak i\u00e7in de kullan\u0131labilir. <strong>Bir SSH sunucusu varsay\u0131lan olarak standart Transmission Control Protocol (TCP) port 22&#8217;yi dinler.<\/strong><\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7erik Tablosu<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-6a04af071f42a\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\" id=\"ez-toc-cssicon-toggle-item-6a04af071f42a\" aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-Nasil-Calisir\" >SSH Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-Kullanimi\" >SSH Kullan\u0131m\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSHnin-Ozellikleri\" >SSH&#8217;nin \u00d6zellikleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSHnin-Tarihcesi\" >SSH&#8217;nin Tarih\u00e7esi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-Guvenlik-Sorunlari\" >SSH G\u00fcvenlik Sorunlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-ve-Telnet-Karsilastirmasi\" >SSH ve Telnet Kar\u015f\u0131la\u015ft\u0131rmas\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-ve-SSL-TLS-Karsilastirmasi\" >SSH ve SSL \/ TLS Kar\u015f\u0131la\u015ft\u0131rmas\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-Uygulama-Alanlari\" >SSH Uygulama Alanlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-Komutlari\" >SSH Komutlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.ihs.com.tr\/blog\/ssh-nedir\/#SSH-Tunelleme\" >SSH T\u00fcnelleme<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"SSH-Nasil-Calisir\"><\/span><b>SSH Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><strong>SSH<\/strong>,<\/span> <span style=\"font-weight: 400;\">Telnet<\/span><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">rlogin<\/span><span style=\"font-weight: 400;\"> (uzaktan oturum a\u00e7ma) ve rsh (remote shell) gibi g\u00fcvenli olmayan terminal emulasyonunun veya oturum a\u00e7ma programlar\u0131n\u0131n yerini almak \u00fczere olu\u015fturulmu\u015ftur; SSH ayn\u0131 i\u015flevleri etkinle\u015ftirir (uzak sistemlerde oturum a\u00e7mak ve terminal oturumlar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131rmak). <strong>SSH ayr\u0131ca File Transfer Protocol(<\/strong><\/span><strong><a href=\"https:\/\/www.ihs.com.tr\/blog\/ftp-nedir\/\">FTP<\/a>) ve rcp (remote copy) i\u015flemlerinin de yerini almaktad\u0131r.<\/strong><\/p>\n<p><strong>SSH&#8217;nin en temel kullan\u0131m\u0131, terminal oturumu i\u00e7in remote bir host bilgisayara ba\u011flanmakt\u0131r. Bu komutun bi\u00e7imi \u015f\u00f6yledir:<\/strong><\/p>\n<p><code>ssh UserName@SSHserver.example.com<\/code><\/p>\n<p><span style=\"font-weight: 400;\">Bu komut, istemcinin <\/span><strong><i>server.example.com<\/i><\/strong><span style=\"font-weight: 400;\"> adl\u0131 sunucuya <\/span><strong><i>UserName<\/i><\/strong><span style=\"font-weight: 400;\"> kullan\u0131c\u0131 kimli\u011fini kullanarak ba\u011flanmaya \u00e7al\u0131\u015fmas\u0131na neden olur. Lokal host ile sunucu aras\u0131nda ilk kez bir ba\u011flant\u0131 kurulmaya \u00e7al\u0131\u015f\u0131l\u0131rsa, remote host bilgisayar\u0131n public key parmak izi talep edilir ve \u00f6nceden bir ba\u011flant\u0131 olmamas\u0131na ra\u011fmen ba\u011flant\u0131 kurmas\u0131 istenir:<\/span><\/p>\n<pre>The authenticity of host 'sample.ssh.com' cannot be established.\r\n DSA key fingerprint is 01:23:45:67:89:ab:cd:ef:ff:fe:dc:ba:98:76:54:32:10.\r\n Are you sure you want to continue connecting (yes\/no)?<\/pre>\n<p><i><span style=\"font-weight: 400;\">Evet<\/span><\/i><span style=\"font-weight: 400;\"> derseniz, oturumun devam etmesine neden olursunuz ve host anahtar\u0131 yerel sistemin known_hosts dosyas\u0131nda saklan\u0131r. Bu dosya, varsay\u0131lan olarak kullan\u0131c\u0131n\u0131n ana dizininde <strong>\/.ssh\/known_hosts<\/strong> adl\u0131 gizli bir dizinde depolanan gizli bir dosyad\u0131r. Host anahtar\u0131 known_hosts dosyas\u0131nda sakland\u0131ktan sonra, istemci herhangi bir onay gerektirmeden do\u011frudan o sunucuya tekrar ba\u011flanabilir ve host anahtar\u0131 ba\u011flant\u0131y\u0131 do\u011frular.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSH-Kullanimi\"><\/span><b>SSH Kullan\u0131m\u0131<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><strong>T\u00fcm veri merkezlerinde kullan\u0131lan SSH, varsay\u0131lan olarak her Unix, Linux ve Mac sunucusuyla birlikte g\u00f6nderilir.<\/strong> SSH ba\u011flant\u0131lar\u0131, kaynaklara, komutlar\u0131n uzaktan y\u00fcr\u00fct\u00fclmesine, yaz\u0131l\u0131m yamalar\u0131n\u0131n ve g\u00fcncellemelere ve di\u011fer y\u00f6netim g\u00f6revlerine<\/span> <span style=\"font-weight: 400;\">uzaktan eri\u015fim<\/span><span style=\"font-weight: 400;\"> de dahil olmak \u00fczere local host ile remote host aras\u0131nda g\u00fcvenli bir\u00e7ok farkl\u0131 ileti\u015fim t\u00fcr\u00fcn\u00fc g\u00fcvenceye almak i\u00e7in kullan\u0131lm\u0131\u015ft\u0131r. Lokal ve remote bilgisayarlar aras\u0131nda g\u00fcvenli bir kanal olu\u015fturman\u0131n yan\u0131 s\u0131ra SSH, y\u00f6nlendiricileri, sunucu donan\u0131m\u0131n\u0131, <\/span><span style=\"font-weight: 400;\">sanalla\u015ft\u0131rma<\/span><span style=\"font-weight: 400;\"> platformlar\u0131n\u0131, i\u015fletim sistemlerini (OS), i\u00e7 sistem y\u00f6netimini ve dosya aktar\u0131m uygulamalar\u0131n\u0131 y\u00f6netmek i\u00e7in de kullan\u0131lmaktad\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>SSH<\/strong>, ilgili ara\u00e7lar\u0131 kullanarak veya do\u011frudan terminal arac\u0131l\u0131\u011f\u0131yla sunuculara ba\u011flanmak, de\u011fi\u015fiklik yapmak, y\u00fckleme yapmak ve \u00e7\u0131k\u0131\u015f yapmak i\u00e7in kullan\u0131l\u0131r. SSH anahtarlar\u0131 sunuculara eri\u015fimi otomatikle\u015ftirmek i\u00e7in kullan\u0131labilir ve genellikle komut dosyalar\u0131nda, yedekleme sistemlerinde ve <\/span><span style=\"font-weight: 400;\">konfig\u00fcrasyon y\u00f6netimi<\/span><span style=\"font-weight: 400;\"> ara\u00e7lar\u0131nda tercih edilir. Uygun olmas\u0131 ve kurulu\u015f s\u0131n\u0131rlar\u0131 i\u00e7inde \u00e7al\u0131\u015fmas\u0131 i\u00e7in tasarlanan SSH anahtarlar\u0131, tek oturum a\u00e7ma (<\/span><span style=\"font-weight: 400;\">SSO &#8211; Single Sign-on<\/span><span style=\"font-weight: 400;\">) imkan\u0131 sunar, b\u00f6ylece kullan\u0131c\u0131lar her seferinde \u015fifre girmeye gerek duymadan hesaplar\u0131 aras\u0131nda hareket edebilirler.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSH her ne kadar kimlik y\u00f6netimi ve eri\u015fim y\u00f6netiminde \u00f6nemli roller oynasa da asl\u0131nda \u015fifreli bir ba\u011flant\u0131 \u00fczerinden kimlik do\u011frulamas\u0131 sa\u011flamaktan daha fazlas\u0131n\u0131 sunabilmektedir. T\u00fcm SSH trafi\u011fi \u015fifrelenir; kullan\u0131c\u0131lar\u0131n bir dosyay\u0131 aktarmas\u0131, web&#8217;de gezinmesi veya bir komut \u00e7al\u0131\u015ft\u0131r\u0131yorlarsa gibi, ancak eylemleri gizlidir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSH&#8217;yi s\u0131radan bir kullan\u0131c\u0131 kimli\u011fi ve parolal\u0131 kimlik bilgisii olarak kullanmak m\u00fcmk\u00fcn olsa da, SSH, host bilgisayarlar\u0131n birbirlerinin kimli\u011fini do\u011frulamas\u0131 i\u00e7in public key (genel anahtar) \u00e7iftlerini daha \u00e7ok kullan\u0131r. Bireysel kullan\u0131c\u0131lar remote bir hosta ba\u011flanmak i\u00e7in kullan\u0131c\u0131 kimliklerini ve parolalar\u0131n\u0131 veya di\u011fer kimlik do\u011frulama y\u00f6ntemlerini kullanmaya devam etmelidir, ancak lokal host ve remote host birbirinden ayr\u0131 olarak kimlik do\u011frulamas\u0131 yapar. Bu do\u011frulama i\u015flemi, ileti\u015fimdeki her host bilgisayar i\u00e7in benzersiz bir public key \u00e7ifti olu\u015fturularak ger\u00e7ekle\u015ftirilir; tek bir oturumda iki public key \u00e7ifti gerekir: bunlar, remote makineyi lokal makinede do\u011frulamak i\u00e7in olu\u015fturulan bir public key \u00e7ifti ve lokal makineyi remote makinede do\u011frulamak i\u00e7in olu\u015fturulan ikinci bir public key \u00e7iftidir.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSHnin-Ozellikleri\"><\/span><b>SSH&#8217;nin \u00d6zellikleri<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>SSH&#8217;nin etkinle\u015ftirdi\u011fi i\u015flevler \u015funlar\u0131 i\u00e7erir:<\/strong><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Kullan\u0131c\u0131lar i\u00e7in SSH \u00f6zellikli a\u011f sistemlerine veya cihazlar\u0131na ve otomatik i\u015flemlere g\u00fcvenli uzaktan eri\u015fim;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">G<\/span><span style=\"font-weight: 400;\">\u00fcvenli ve etkile\u015fimli dosya aktar\u0131m oturumlar\u0131;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Otomatik ve g\u00fcvenli dosya aktar\u0131mlar\u0131;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Remote cihazlara veya sistemlere g\u00fcvenli komut verme; ve<\/span><\/li>\n<li><span style=\"font-weight: 400;\">A\u011f altyap\u0131s\u0131 bile\u015fenlerinin g\u00fcvenli bir \u015fekilde y\u00f6netimi.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">SSH, terminal oturumlar\u0131n\u0131 aktive etmek i\u00e7in etkile\u015fimli olarak kullan\u0131labilir ve daha az g\u00fcvenli Telnet program\u0131 yerine kullan\u0131lmal\u0131d\u0131r. SSH, programlar\u0131n ve sistemlerin verilere ve di\u011fer kaynaklara uzaktan ve g\u00fcvenli bir \u015fekilde eri\u015fmesini sa\u011flamak i\u00e7in komut dosyalar\u0131nda ve di\u011fer yaz\u0131l\u0131mlarda da yayg\u0131n olarak kullan\u0131l\u0131r.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSHnin-Tarihcesi\"><\/span><b>SSH&#8217;nin Tarih\u00e7esi<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SSH&#8217;nin ilk versiyonu 1995 y\u0131l\u0131nda ortaya \u00e7\u0131kt\u0131 ve o zamanlar Helsinki Teknoloji \u00dcniversitesi&#8217;nde ara\u015ft\u0131rmac\u0131 olan ve daha sonra Finlandiya merkezli bir siber g\u00fcvenlik hizmet sa\u011flay\u0131c\u0131s\u0131 SSH Communications Security&#8217;yi kuran Tatu Yl\u00f6nen taraf\u0131ndan tasarland\u0131. Zamanla, SSH-1&#8217;de \u00e7e\u015fitli hatalar bulundu ve bu versiyon art\u0131k kullan\u0131mdan kald\u0131r\u0131ld\u0131. Ve kullan\u0131m\u0131 g\u00fcvenli de\u011fildir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Secure Shell protokollerinin mevcut s\u00fcr\u00fcm\u00fc olan SSH-2, 2006 y\u0131l\u0131nda Internet Engineering Task Force (IETF) taraf\u0131ndan Internet Standard\u0131na uygun olarak kabul edildi. SSH-2, SSH-1 ile uyumlu de\u011fildir ve bir <\/span><span style=\"font-weight: 400;\">Diffie-Hellman anahtar de\u011fi\u015fimi<\/span><span style=\"font-weight: 400;\"> kullan\u0131r. G\u00fcvenli\u011fi art\u0131rmak i\u00e7in ileti kimlik do\u011frulama kodlar\u0131n\u0131 kullanan daha g\u00fc\u00e7l\u00fc bir b\u00fct\u00fcnl\u00fck denetimi sunar. SSH istemcileri ve sunucular\u0131, en bilinen sistemlerden Geli\u015fmi\u015f \u015eifreleme Standard\u0131\u2019n\u0131 (<\/span><span style=\"font-weight: 400;\">Advanced Encryption Standard-AES<\/span><span style=\"font-weight: 400;\">) ve <\/span><span style=\"font-weight: 400;\">Blowfish<\/span><span style=\"font-weight: 400;\">\u2019i ve daha bir\u00e7ok \u015fifreleme sistemini kullan\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u015eimdiye kadar, SSH-2&#8217;de bilinen bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 yoktur, ancak <\/span><strong>Edward Snowden<\/strong><span style=\"font-weight: 400;\"> 2013 y\u0131l\u0131nda Ulusal G\u00fcvenlik Ajans\u0131&#8217;n\u0131n (NSA) baz\u0131 SSH trafi\u011fi \u015fifresini \u00e7\u00f6zebilece\u011fini ileri s\u00fcrm\u00fc\u015ft\u00fcr.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSH-Guvenlik-Sorunlari\"><\/span><b>SSH G\u00fcvenlik Sorunlar\u0131<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SSH kullanan i\u015fletmeler, istemci sistemlerde depolanan host anahtarlar\u0131n\u0131 y\u00f6netmek i\u00e7in baz\u0131 \u00e7\u00f6z\u00fcmler geli\u015ftirmeye ihtiya\u00e7 duyarlar; bu anahtarlar zaman i\u00e7inde, \u00f6zellikle y\u00f6netim amac\u0131yla remote host makinelere eri\u015fmesi gereken bilgi teknolojisi (BT) \u00e7al\u0131\u015fanlar\u0131 i\u00e7in gitgide birikecektir. <strong>SSH known_hosts<\/strong> dosyas\u0131nda saklanan veriler remote sistemlere kimlik do\u011frulamal\u0131 eri\u015fim elde etmek i\u00e7in kullan\u0131labilece\u011finden, kurulu\u015flar bu dosyalar\u0131n varl\u0131\u011f\u0131ndan haberdar olmal\u0131 ve bir sistemi kullanmay\u0131 b\u0131rakt\u0131ktan sonra bile dosyalar \u00fczerindeki denetimi korumak i\u00e7in standart bir i\u015fleme sahip olmal\u0131d\u0131r, \u00e7\u00fcnk\u00fc bu veriler sabit disklerde d\u00fcz metin olarak saklan\u0131yor olabilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Geli\u015ftiriciler, bir komut dosyas\u0131na veya ba\u015fka bir program t\u00fcr\u00fcne SSH komutlar\u0131n\u0131 veya i\u015flevlerini dahil ederken de dikkatli olmal\u0131d\u0131r. Lokal makinenin kullan\u0131c\u0131s\u0131n\u0131n, remote host makinedeki bir hesapta kimli\u011fini do\u011frulamak i\u00e7in bir kullan\u0131c\u0131 kimli\u011fi ve parola i\u00e7eren bir SSH komutu vermesi m\u00fcmk\u00fcn olsa da, bunu yapmak kaynak koduna eri\u015fimi olan bir sald\u0131rgana kimlik bilgilerinin g\u00f6sterilmesine de sebep olabilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Shellshock<\/span><span style=\"font-weight: 400;\">bash<\/span><span style=\"font-weight: 400;\"> komut i\u015flemcisinde bulunan bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131, SSH \u00fczerinden y\u00fcr\u00fct\u00fclebilir, ancak SSH&#8217;de de\u011fil, esasen <strong>Bash<\/strong>&#8216;ta var olan bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r. <strong>SSH i\u00e7in en b\u00fcy\u00fck tehdit k\u00f6t\u00fc anahtar (key) y\u00f6netimidir.<\/strong> SSH anahtarlar\u0131 i\u00e7in do\u011fru merkezi yap\u0131n\u0131n varl\u0131\u011f\u0131, d\u00f6nd\u00fcr\u00fclmesi ve kald\u0131r\u0131lmas\u0131 sa\u011flanmad\u0131\u011f\u0131 s\u00fcrece, kurulu\u015flar \u00f6zellikle SSH\u2019nin uygulamadan uygulamaya ge\u00e7i\u015fli otomatik s\u00fcre\u00e7lerde kullan\u0131m\u0131nda, kimin hangi kayna\u011fa ne zaman eri\u015fim sa\u011flad\u0131\u011f\u0131 konusunda kontrol\u00fc kaybedebilir.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSH-ve-Telnet-Karsilastirmasi\"><\/span><b>SSH ve Telnet Kar\u015f\u0131la\u015ft\u0131rmas\u0131<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\"><strong>Telnet<\/strong> ilk internet uygulama protokollerinden biridir &#8211; di\u011fer protokol ise FTP&#8217;dir ve Telnet uzak bir host bilgisayarda bir terminal oturumu ba\u015flatmak ve s\u00fcrd\u00fcrmek i\u00e7in kullan\u0131l\u0131r.<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\"><strong>SSH ve Telnet i\u015flevsel olarak benzerdir<\/strong>, ancak aralar\u0131ndaki birincil fark <strong>SSH protokol\u00fcn\u00fcn<\/strong> kulland\u0131\u011f\u0131 <\/span><span style=\"font-weight: 400;\">public key \u015fifrelemesidir.<\/span><span style=\"font-weight: 400;\"> B\u00f6ylece bir terminal, oturumu ayarlarken u\u00e7 noktalar\u0131n kimli\u011fini do\u011frulaman\u0131n yan\u0131 s\u0131ra oturum komutlar\u0131n\u0131 ve \u00e7\u0131kt\u0131s\u0131n\u0131 \u015fifreleyebilir.<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Telnet esas olarak terminal em\u00fclasyonu i\u00e7in kullan\u0131l\u0131rken, SSH,\u00a0 <\/span><span style=\"font-weight: 400;\">rlogin<\/span><span style=\"font-weight: 400;\"> komutuna benzer em\u00fclasyon yapmak i\u00e7in kullan\u0131labilir &#8211; ayr\u0131ca rsh gibi remote komutlar vermek i\u00e7in, SSH Dosya Aktar\u0131m Protokol\u00fc (<\/span><span style=\"font-weight: 400;\">SFTP<\/span><span style=\"font-weight: 400;\">) ile dosya g\u00f6nderimi ve di\u011fer uygulamalar\u0131 <strong>t\u00fcnellem<\/strong>e i\u00e7in de kullan\u0131l\u0131r.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSH-ve-SSL-TLS-Karsilastirmasi\"><\/span><b>SSH ve SSL \/ TLS Kar\u015f\u0131la\u015ft\u0131rmas\u0131<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Transport Layer Security &#8211; TLS <\/strong><span style=\"font-weight: 400;\">, Secure Sockets Layer (<\/span><a href=\"https:\/\/www.ihs.com.tr\/blog\/ssl-sertifikasi-nedir-onemlidir\/\"><span style=\"font-weight: 400;\">SSL<\/span><\/a><span style=\"font-weight: 400;\">) protokol\u00fcn\u00fc g\u00fcncelleyerek, ta\u015f\u0131ma katman\u0131ndaki a\u011f iletimleri i\u00e7in g\u00fcvenlik sa\u011flamak \u00fczere tasarlanm\u0131\u015ft\u0131r. SSH protokol\u00fc ayr\u0131ca ta\u015f\u0131ma katman\u0131nda veya hemen \u00fczerinde \u00e7al\u0131\u015f\u0131r, ancak iki protokol aras\u0131nda \u00f6nemli farkl\u0131l\u0131klar vard\u0131r.<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">Her ikisi de host bilgisayarlar\u0131n kimli\u011fini do\u011frulamak i\u00e7in public \/ private anahtar \u00e7iftlerine g\u00fcvenirken, TLS alt\u0131nda sadece sunucunun kimli\u011fi bir anahtar \u00e7ifti ile do\u011frulan\u0131r. SSH, her ba\u011flant\u0131y\u0131 do\u011frulamak i\u00e7in ayr\u0131 bir anahtar \u00e7ifti kullan\u0131r: lokal makineden remote makineye ba\u011flant\u0131 i\u00e7in bir anahtar \u00e7ifti ve remote makineden lokal makineye ba\u011flant\u0131y\u0131 do\u011frulamak i\u00e7in ikinci bir anahtar \u00e7ifti.<\/span><\/p><\/blockquote>\n<p><strong>SSH ve TLS aras\u0131ndaki di\u011fer bir fark, TLS&#8217;nin ba\u011flant\u0131lar\u0131n kimlik do\u011frulamas\u0131 olmadan \u015fifrelenmesine veya \u015fifreleme olmadan do\u011frulanmas\u0131na olanak vermesidir; SSH ise t\u00fcm ba\u011flant\u0131lar\u0131 \u015fifreler ve do\u011frular.<\/strong><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">SSH, IT ve bilgi g\u00fcvenli\u011fi (infosec) profesyonellerine SSH istemcilerini uzaktan y\u00f6netmek i\u00e7in g\u00fcvenli bir mekanizma sa\u011flar. SSH istemcisi ile sunucu aras\u0131ndaki ba\u011flant\u0131y\u0131 ba\u015flatmak i\u00e7in parola kimlik do\u011frulamas\u0131 gerektirmek yerine, SSH cihazlar\u0131n kendi kimliklerini do\u011frular. Bu do\u011frulama, IT personelinin known_hosts dosyas\u0131na host anahtar\u0131 \u00e7iftlerini eklemesine veya kald\u0131rmas\u0131na, remote sistemlere ba\u011flanmas\u0131na ve SSH yap\u0131land\u0131rmalar\u0131n\u0131 de\u011fi\u015ftirmesine olanak sa\u011flar.<\/span><\/p><\/blockquote>\n<h2><span class=\"ez-toc-section\" id=\"SSH-Uygulama-Alanlari\"><\/span><b>SSH Uygulama Alanlar\u0131<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A\u00e7\u0131k bir protokol olarak, SSH \u00e7o\u011fu bilgi i\u015flem platformu i\u00e7in uygulanmaktad\u0131r ve a\u00e7\u0131k kaynak kodlu OpenSSH uygulamas\u0131, Berkeley Yaz\u0131l\u0131m Da\u011f\u0131t\u0131m\u0131 (<\/span><span style=\"font-weight: 400;\">BSD<\/span><span style=\"font-weight: 400;\">) \u00fczerinden Linux, Unix ve di\u011fer i\u015fletim sistemlerinde en yayg\u0131n olarak bulunan Apple&#8217;\u0131n macOS&#8217;u da dahil bir uygulamad\u0131r.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>OpenSSH<\/strong>, 2015&#8217;ten itibaren <strong>Windows PowerShell<\/strong>&#8216;de \u00e7al\u0131\u015facak \u015fekilde ta\u015f\u0131nm\u0131\u015ft\u0131r ve 2018&#8217;de iste\u011fe ba\u011fl\u0131 OpenSSH deste\u011fi, Windows 10&#8217;a eklenmi\u015ftir. SSH, Unix benzeri i\u015fletim sistemlerinin \u00e7o\u011funda varsay\u0131lan olarak do\u011frudan eri\u015filebilir olsa da, Microsoft&#8217;un OpenSSH&#8217;nin ta\u015f\u0131nan s\u00fcr\u00fcm\u00fcnde Windows Ayarlar\u0131 k\u0131sm\u0131nda sizin taraf\u0131n\u0131zdan etkinle\u015ftirilmesi gerekir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>PuTTY<\/strong>, SSH&#8217;nin ba\u015fka bir a\u00e7\u0131k kaynak uygulamas\u0131d\u0131r ve \u015fu anda Windows, macOS ve Unix \/ BSD i\u00e7in kullan\u0131labilmektedir ancak PuTTY ba\u015flang\u0131\u00e7ta Windows&#8217;ta \u00e7al\u0131\u015facak \u015fekilde yaz\u0131lm\u0131\u015ft\u0131r. Bir Windows sisteminde SSH kullanmak i\u00e7in uzun zamand\u0131r en iyi se\u00e7eneklerden biri olmu\u015ftur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSH paketinin \u00e7o\u011fu uygulamas\u0131, \u00f6nceki g\u00fcvenli olmayan Unix yard\u0131mc\u0131 programlar\u0131n\u0131n(rlogin, rsh ve rcp) g\u00fcvenli s\u00fcr\u00fcmleri olan, slogin (g\u00fcvenli oturum a\u00e7ma), ssh ve scp (g\u00fcvenli kopya) olmak \u00fczere \u00fc\u00e7 yard\u0131mc\u0131 program\u0131 i\u00e7erir. SSH, uzaktaki bilgisayar\u0131n kimli\u011fini do\u011frulamak i\u00e7in public key \u015fifrelemesi kullan\u0131r ve gerekirse remote bilgisayar\u0131n kullan\u0131c\u0131n\u0131n kimli\u011fini do\u011frulamas\u0131n\u0131 sa\u011flar.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u015eu anda \u00e7e\u015fitli platformlar i\u00e7in ve \u00e7e\u015fitli a\u00e7\u0131k kaynakl\u0131 ve tescilli lisanslar alt\u0131nda bir\u00e7ok SSH uygulamas\u0131 bulunmaktad\u0131r.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"SSH-Komutlari\"><\/span><b>SSH Komutlar\u0131<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SSH&#8217;nin grafik uygulamalar\u0131 olsa da, program genellikle komut sat\u0131r\u0131ndan \u00e7a\u011fr\u0131l\u0131r veya bir komut dosyas\u0131n\u0131n par\u00e7as\u0131 olarak y\u00fcr\u00fct\u00fcl\u00fcr. Hedef host veya kullan\u0131c\u0131 kimli\u011fi gibi ba\u011f\u0131ms\u0131z de\u011fi\u015fkenler olmadan,<\/span><span style=\"font-weight: 400;\">SSH\u2019yi <\/span><span style=\"font-weight: 400;\">kendi komutu i\u00e7erisinde \u00e7al\u0131\u015ft\u0131rmak size SSH komut parametrelerinin ve se\u00e7eneklerinin bir listesini getirecektir.<\/span><\/p>\n<p><strong>SSH komutunun en temel formu, program\u0131 ve hedef host bilgisayar ad\u0131n\u0131 veya Internet Protokol\u00fc (IP) adresini \u00e7a\u011f\u0131rmakt\u0131r:<\/strong><\/p>\n<p><strong><code>ssh server.example.org<\/code><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">B\u00f6ylece server.example.org hedefine ba\u011flan\u0131r; hedef host bilgisayar, istemcinin \u00e7al\u0131\u015ft\u0131\u011f\u0131 hesab\u0131n kullan\u0131c\u0131 kimli\u011fi i\u00e7in bir \u015fifre girerek yan\u0131t verecektir. Ba\u015fka bir deyi\u015fle, kullan\u0131mdaki kullan\u0131c\u0131 kimli\u011fi <\/span><i><span style=\"font-weight: 400;\">jsmith<\/span><\/i><span style=\"font-weight: 400;\"> ise,remote host makine\u00a0 <\/span><i><span style=\"font-weight: 400;\">jsmith<\/span><\/i><span style=\"font-weight: 400;\"> isimli hesapla ili\u015fkilendirilmi\u015f bir \u015fifre isteyecektir. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00c7o\u011fu durumda, remote host bilgisayar\u0131n kullan\u0131c\u0131 kimli\u011fi farkl\u0131 olacakt\u0131r, bu durumda komutun remote host kullan\u0131c\u0131 kimli\u011fiyle verilmesi gerekir, \u00f6rne\u011fin:<\/span><\/p>\n<p><code><strong>ssh remote_host_userID@server.example.org<\/strong><\/code><\/p>\n<hr \/>\n<p><span style=\"font-weight: 400;\">SSH, remote host bilgisayarda tek bir komut vermek ve sonra \u00e7\u0131k\u0131\u015f yapmak i\u00e7in komut sat\u0131r\u0131ndan da kullan\u0131labilir &#8211; \u00f6rne\u011fin:<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><code>ssh example.org ls<\/code><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bu komut Unix&#8217;i \u00e7al\u0131\u015ft\u0131r\u0131r. <\/span><span style=\"font-weight: 400;\">ls<\/span><span style=\"font-weight: 400;\"> komutu, remote host makinedeki ge\u00e7erli dizinin t\u00fcm i\u00e7eri\u011fini listeleyen komuttur. Bu \u00f6rnek \u00f6nemsiz olmakla birlikte, SSH&#8217;nin remote bilgisayarda daha ilgin\u00e7 komutlar y\u00fcr\u00fctmek i\u00e7in kullan\u0131labilece\u011fini g\u00f6stermektedir. \u00d6rne\u011fin, remote makineye tek bir dosya veya ba\u015fka bir kaynak i\u00e7in eri\u015fim sa\u011flayacak ve ard\u0131ndan belirtilen host bilgisayar taraf\u0131ndan dosyaya eri\u015fildikten sonra, sunucuyu sonland\u0131racak bir sunucu \u00f6rne\u011fini ba\u015flatan bir komut olu\u015fturulabilir.<\/span><\/p>\n<hr \/>\n<p><span style=\"font-weight: 400;\">Y\u00fcr\u00fct\u00fclebilir SSH&#8217;ye<\/span><span style=\"font-weight: 400;\"> ek olarak , SSH a\u015fa\u011f\u0131dakiler dahil ek i\u015flevler i\u00e7in komut sat\u0131r\u0131nda kullan\u0131lan di\u011fer y\u00fcr\u00fct\u00fclebilir komutlara sahiptir:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"><strong>sshd<\/strong>,<\/span><span style=\"font-weight: 400;\"> gelen SSH ba\u011flant\u0131 isteklerini bekleyen ve yetkili sistemlerin lokal host bilgisayara ba\u011flanmas\u0131n\u0131 sa\u011flayan SSH sunucusunu ba\u015flat\u0131r.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><strong>ssh-keygen<\/strong>,<\/span><span style=\"font-weight: 400;\"> SSH i\u00e7in oturumlar\u0131 otomatikle\u015ftirmek, SSO&#8217;yu uygulamak ve host bilgisayarlar\u0131n kimli\u011fini do\u011frulamak i\u00e7in kullan\u0131labilecek yeni bir kimlik do\u011frulama anahtar\u0131 \u00e7ifti olu\u015fturmak i\u00e7in kullan\u0131lan bir programd\u0131r.<\/span><\/li>\n<li><strong>ssh-copy-id<\/strong> <span style=\"font-weight: 400;\">\u015fifresiz<\/span><span style=\"font-weight: 400;\"> giri\u015fler ve SSO s\u00fcre\u00e7lerini otomatikle\u015ftirmek i\u00e7in sunucuya bir SSH anahtar\u0131n\u0131 kopyalamak, y\u00fcklemek ve yap\u0131land\u0131rmak i\u00e7in kullan\u0131lan bir programd\u0131r\u00a0<\/span><\/li>\n<li><strong>SSH-agent<\/strong><span style=\"font-weight: 400;\"> ise SSH&#8217;nin bir \u015fifreleme anahtar\u0131 \u00fcretti\u011fi kimlik anahtarlar\u0131n\u0131 ve parolalar\u0131n\u0131 izleyen ve kullan\u0131c\u0131n\u0131n parolalar\u0131 veya kimlik anahtarlar\u0131n\u0131 yeniden girmelerine gerek kalmadan farkl\u0131 sunucularda oturum a\u00e7mak i\u00e7in kullanmalar\u0131n\u0131 sa\u011flayan yard\u0131mc\u0131 bir programd\u0131r.<\/span><\/li>\n<li><strong>ssh-add<\/strong><span style=\"font-weight: 400;\"> , SSH kimlik do\u011frulama arac\u0131s\u0131na bir anahtar eklemek i\u00e7in ve <\/span><span style=\"font-weight: 400;\">SSH-agent<\/span><span style=\"font-weight: 400;\"> ile SSH kullanarak SSO uygulamak i\u00e7in kullan\u0131l\u0131r.<\/span><\/li>\n<li><strong>scp <\/strong><span style=\"font-weight: 400;\">ise dosyalar\u0131 bir bilgisayardan di\u011ferine kopyalamak i\u00e7in kullan\u0131lan bir programd\u0131r ve\u00a0 <\/span><span style=\"font-weight: 400;\">Rcp\u2019<\/span><span style=\"font-weight: 400;\">nin <\/span><span style=\"font-weight: 400;\">SSH ile g\u00fcvenli hale getirilmi\u015f bir s\u00fcr\u00fcm\u00fcd\u00fcr.<\/span><\/li>\n<li><strong>sftp<\/strong><span style=\"font-weight: 400;\"> ise dosyalar\u0131 bir bilgisayardan di\u011ferine kopyalamak i\u00e7in kullan\u0131lan bir programd\u0131r ve <\/span><span style=\"font-weight: 400;\">ftp<\/span><span style=\"font-weight: 400;\">&#8216;nin, yani orijinal File Transfer Protocol&#8217;\u00fcn SSH ile daha g\u00fcvenli hale gelmi\u015f bir s\u00fcr\u00fcm\u00fcd\u00fcr. SFTP, SSL \/ TLS t\u00fcneli \u00fczerinden FTP kullanma protokol\u00fc olan FTP \/ S&#8217;yi (FTP Secure) ve de FTP&#8217;nin yerine ge\u00e7erek internet \u00fczerinden dosya payla\u015f\u0131m\u0131 i\u00e7in tercih edilen bir mekanizma haline gelmi\u015ftir.<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"SSH-Tunelleme\"><\/span><b>SSH T\u00fcnelleme<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>SSH t\u00fcnellemesi, <i>SSH port y\u00f6nlendirmesi<\/i><\/strong><span style=\"font-weight: 400;\"><strong> olarak da bilinir<\/strong>, kullan\u0131c\u0131n\u0131n lokal bir bilgisayar ile remote bir host bilgisayar aras\u0131nda g\u00fcvenli bir t\u00fcnel a\u00e7mas\u0131n\u0131 sa\u011flayan bir tekniktir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>SSH port y\u00f6nlendirmesi<\/strong> ise, uzaktaki bir host bilgisayar\u0131n lokaldeki host bilgisayar uygulamalar\u0131 taraf\u0131ndan do\u011frudan eri\u015filebilir olmas\u0131n\u0131 sa\u011flamak i\u00e7in a\u011f trafi\u011fini belirli bir porta \/ IP adresine y\u00f6nlendirmek i\u00e7in kullan\u0131lan bir tekniktir. Belirlenen hedef, bir remote SSH sunucusunda olabilir veya bu sunucu ba\u015fka bir remote host bilgisayara iletecek \u015fekilde yap\u0131land\u0131r\u0131lm\u0131\u015f olabilir.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSH t\u00fcnelleri, IT y\u00f6neticileri ve de ayn\u0131 zamanda k\u00f6t\u00fc niyetli yaz\u0131l\u0131mc\u0131lar a\u00e7\u0131s\u0131nda da g\u00fc\u00e7l\u00fc ara\u00e7lard\u0131r, \u00e7\u00fcnk\u00fc fark edilmeden bir kurumsal g\u00fcvenlik duvar\u0131n\u0131 ge\u00e7irebilirler. Sonu\u00e7 olarak, \u015firket g\u00fcvenlik duvar\u0131 \u00fczerinden SSH t\u00fcnellerinin yetkisiz kullan\u0131m\u0131n\u0131 \u00f6nlemek i\u00e7in kullan\u0131lan \u00e7e\u015fitli ara\u00e7lar mevcuttur.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure Shell veya Secure Socket Shell olarak da bilinen SSH, kullan\u0131c\u0131lara, \u00f6zellikle sistem y\u00f6neticilerine, g\u00fcvenli olmayan bir a\u011f \u00fczerinden bir bilgisayara eri\u015fmek&hellip;<\/p>\n","protected":false},"author":3,"featured_media":13238,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[414],"tags":[],"class_list":["post-13235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sunucu"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13235"}],"version-history":[{"count":4,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13235\/revisions"}],"predecessor-version":[{"id":13240,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13235\/revisions\/13240"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media\/13238"}],"wp:attachment":[{"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ihs.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}