Security with Secure KoalaTerm

SSH Support

Secure KoalaTerm support both SSH protocol version 1.5 and SSH version 2 (will be SecSH protocol).

The server release for SSH1 should be 1.2.27 or later. The server release for SSH2 should be 2.0.13 or later.

Secure KoalaTerm uses strong security. It's developed outside of United States so it's not subject to export regulation. However, users who is not a United States citizen or legal permanent resident, or is outside of United States, can not download Secure KoalaTerm from a web site in United States, like Midasoft's main website (http://www.midasoft.com). Instead, we provide an alternative site: http://website.lineone.net/~midasoft/mkts.zip which is outside of United States.

You Are Protected

With SSH, you are protected when you access the host via untrusted Internet or other network.

All the communications between your PC and the host, including login information and the whole session, are encrypted with strong cipher, and the key used to do the encryption can be dynamically regenerated, give hackers little time to try to decrypt. SSH also provide MAC (Message Authenticate Code) for each packet exchanged between PC and host, so anything changed by the man-in-the-middle will be detected.

SSH also makes use of digital signature technology. You can use digital signature to prove your identity to your host and Secure KoalaTerm can also check identity of the host, so you can be sure to whom you are actually talking to.

Connecting to Host

It's very easy to use Secure KoalaTerm to connect to a host with SSH support (i.e. sshd is running on that host). First, you need to choose the version of SSH you want to use (when you select connection type in the "New Connection" dialog box), you might need to confirm with your host administrator about the SSH version your host supports. Or, if you see the message like "Host version not supported", you can change the version and try again.

Then, you need to decide which method you want to use to authenticate yourself onto the host. Secure KoalaTerm supports two methods of authentication: using username with password, or using public key. You might need to confirm with your host administrator about which method the host want you to use. Using username with password is the easiest way to get connected, but some host might consider it's not secure enough and prefer public key method.

If public key authentication is required, you need to do more to get connected. You need to create a key pair including a private key and a public key. The private key will be stored on your PC and protected with a password you specified, while the public key should be transfered to the host and added to "accepted key list" so you can later logon to the host using your public key. You might need help from your host administrator for this key matter. To create your keys, you can select "Create Keys" from "Security" menu, or start "Key Manager" from the same "Security" menu. Note different SSH version uses different kind of keys.

Key Manager

SSH Key Manager allows you to create, remove, export, or import SSH keys. Please note different SSH version uses different Key Manager.


Go to Index Page