Important: Please read the Qt Code of Conduct -

Implementing SSHv2 in Qt

  • Does anyone know a way to implement SSHv2 in Qt? Any ideas is welcome....

  • I have found a clas QxtSSH on LibQxt [], an extension library for Qt. has someone tested?

  • You can use "QCA": with ossl plugin.

  • Hello
    Is the present moment, there's a tutorial on integrating Qt and SSh?
    Can anyone help?

  • Moderators

    Creator also has a SSH implementation in its code somewhere:-)

  • Thank you for your reply. But I can not find it. Maybe someone that was so nice and created a tutorial. Although he said where to look.


  • You can view the code of Qtcssh library of QtCreator "here":

    You can look the class "SshConnection", method "createRemoteShell" or "createSftpChannel".

  • Thank you for your reply, even a Please tell me how to find it?. I was looking for a few months but without success: (And you have found it very quickly. How did you do it?


  • Tobias noted that the QtCreator has this library. And I've the sources (from "here":

  • @maciek openSSL is a vastly conceptually different that SSH.

    From the net:

    SSL and SSH both provide the cryptographic elements to build a tunnel for confidential data transport with checked integrity. For that part, they use similar techniques, and may suffer from the same kind of attacks, so they should provide similar security (i.e. good security) assuming they are both properly implemented. That both exist is a kind of NIH syndrome: the SSH developers should have reused SSL for the tunnel part (the SSL protocol is flexible enough to accommodate many variations, including not using certificates).

    They differ on the things which are around the tunnel. SSL traditionally uses X.509 certificates for announcing server and client public keys; SSH has its own format. Also, SSH comes with a set of protocols for what goes inside the tunnel (multiplexing several transfers, performing password-based authentication within the tunnel, terminal management...) while there is no such thing in SSL, or, more accurately, when such things are used in SSL they are not considered to be part of SSL (for instance, when doing password-based HTTP authentication in a SSL tunnel, we say that it is part of "HTTPS", but it really works in a way similar to what happens with SSH).

    Conceptually, you could take SSH and replace the tunnel part with the one from SSL. You could also take HTTPS and replace the SSL thing with SSH-with-data-transport and a hook to extract the server public key from its certificate. There is no scientific impossibility and, if done properly, security would remain the same. However, there is no widespread set of conventions or existing tools for that.

    So we do not use SSL and SSH for the same things, but that's because of what tools historically came with the implementations of those protocols, not due to a security related difference. And whoever implements SSL or SSH would be well advised to look at what kind of attacks were tried on both protocols.

    This isn't a reasonable comparison to make. SSL is a general method for protecting data transported over a network, whereas SSH is a network application for logging in and sharing data with a remote computer. The transport layer protection in SSH is similar in capability to SSL, so which is "more secure" depends on what your specific threat model calls for and whether the implementations of each address the issues you're trying to deal with. SSH then has a user authentication layer which SSL lacks (because it doesn't need it - SSL just needs to authenticate the two connecting interfaces which SSH can also do). In poorly-drawn UTF-8 art:

      SSL              SSH

    +-------------+ +-----------------+
    | Nothing | | RFC4254 | Connection multiplexing
    +-------------+ +-----------------+
    | Nothing | | RFC4252 | User authentication
    +-------------+ +-----------------+
    | RFC5246 | | RFC4253 | Encrypted data transport
    +-------------+ +-----------------+

    Regarding the issue of which there are more potential attacks against, it seems clear that SSH has a larger attack surface. But that's just because SSH has a whole application built into it: the attack surface of SSL + whatever application you need to provide cannot be compared because we don't have enough information.

Log in to reply