ZOC Terminal

ZOC Terminal 7.23.7 (SN)

下载量:454
最后更新:2019-06-28
当前版本:7.23.7
应用大小:5.4 MB
应用语言:英文
系统要求:OS X 10.6 或更高
应用官网:https://www.emtec.com/zoc/index.html
应用描述:
专业的SSH客户端和终端模拟器

ZOC Terminal 简介:

ZOC Terminal for Mac是一个专业的SSH客户端和终端模拟器。凭借其令人印象深刻的仿真和功能,它是一个可靠和优雅的工具,通过安全的外壳,telnet,串行电缆和其他通信方法连接到主机和大型机。

凭借其现代的用户界面,这个终端有许多方法让您的生活更轻松。 ZOC以其自己的方式成为终端仿真器的瑞士军刀:多功能,强大,经过验证。

详细ZOC SSH功能

ZOC基于OpenSSH,支持SSH协议所提供的最新密钥交换和加密方法。

与OpenSSH不同的是,这个ssh客户端被封装在一个具有强大主机目录,工业强度仿真和脚本的现代选项卡式用户界面中。

以下是ZOC终端的一些核心SSH功能的概述和说明。我们也有一个白皮书,提供了对SSH的更多技术性描述。

密钥交换

加密通信中一个特别困难的部分是需要通过公共信道来协商共享密钥(用于加密的密钥),这个公共信道可能已经被破坏了。

谈判通过所谓的Diffie-Hellman交换或其多种变体之一进行。 ZOC支持所有官方diffie-hellman小组交流,以及更现代的ecdsa-sha2和curve25519-sha256协议。

认证

认证描述了过程,用户提出他是谁和服务器决定的证据,如果用户应该被允许访问。 SSH协议描述了可用于认证的各种方法。

其中,ZOC支持密码认证,密码交换和键盘交互式挑战。公钥交换有不同的口味。 ZOC了解RSA,DSA,ECDSA和ED25519密钥。基于硬件(智能卡)的密钥认证也是可能的。

加密

随着时间的推移,SSH协议已经看到了用于加密通信的多种方法(使用共享密钥在KEX阶段作为密码密钥协商)。随着时间的推移,一些密码逐渐被淘汰,特别是在爱德华·斯诺登(Edward Snowden)透露了像NSA这样的可能的倾听者是多么强大,并且引入了新的密码之后。 ZOC支持整个列表,从aes256-ctr开始,然后到aes256-cbc或arcfour这些较旧的密码(这些较旧的密码可能仍然需要连接到较旧时间未更新的旧服务器)。

转发端口

安全shell协议的一个重要部分是一个称为端口转发的功能。此功能允许用户创建从客户端计算机到服务器网络的连接,这可以被其他程序使用,并且所有连接数据都被加密。这个功能有时被称为隧道。

不使用数据加密(如ftp或rsh)的程序和协议可以连接到客户端计算机的通道端口,ssh客户端将通过加密的ssh连接将数据传输到最终目的地(反之亦然)。

例如,用户可以在客户端软件上设置端口转发(也称为ssh-tunnel),监听客户端端口5514并将流量转发到仅支持未加密的rsh的远程网络上的较早设备的地址协议。

然后,用户可以使用非加密rsh客户端,将其连接到localhost端口5514,从而通过安全shell客户端连接到远程网络上的rsh服务器。一个普通的rsh客户端不会加密它的数据,但是ssh客户端会在通过ssh隧道发送到另一端的主机(反之亦然)之前加密所有的数据流,本质上创建一个加密的rsh连接。

动态端口转发

标准端口转发功能要求客户端在建立连接之前设置隧道源端口和目的地。这意味着灵活性有限,对于每个可能的目的地,都需要建立一个单独的ssh隧道。

安全外壳的动态端口转发解决了这个问题。通过动态端口转发,客户端建立一个监听端口(与正常的端口转发一样),但是当软件连接到端口时,它可以告诉客户端要连接的主机和端口。这与客户端软件可以请求来自SOCKS代理的连接的方式相同。

然后,ssh客户端将连接请求转发到安全shell服务器,该服务器连接到目标主机。这样,ssh客户端可以通过加密的数据通道让未加密的ftp软件访问远程网络上的ftp服务器。

通过代理SSH连接

在某些环境下,终端用户电脑不能直接访问外部网络。在这种情况下,连接和数据交换是通过一个ssh代理来完成的,该ssh代理处理与外部网络(互联网)的实际连接。有各种类型的代理,主要是在不同的SSH客户端请求连接到外部世界。最常见的类型是SOCKS-4,SOCKS-5和HTTP。

SSH代理转发

当用户使用公钥/私钥对验证SSH会话时,ZOC支持SSH代理转发技术,以便在辅助ssh会话中提供身份验证的密钥(通过在远程shell中键入ssh命令,ssh连接到第三个服务器在最初的连接)。如果所有服务器都允许通过这个特定的ssh密钥对进行身份验证,则不需要为次要ssh连接重新提供密码短语。

X11转发

X11是一种通信协议,它允许远程计算机在远程计算机上运行具有图形用户界面的程序(通常远程计算机只能在终端客户机上显示文本)。 SSH支持一种在ssh客户端和服务器之间传输这种类型的通信的方式,从而使用户能够在远程shell上运行一个像Xeyes这样的X11命令,并获得本地计算机上显示的窗口。

zoc_terminal_7092

官方简介:

ZOC Terminal is a professional ssh client and terminal emulator. With its impressive list of emulations and features, it is a reliable and elegant tool that connects you to hosts and mainframes via secure shell, telnet, serial cable and other methods of communication.

With its modern user interface, this terminal has many ways of making your life easier.  In its own way, ZOC is the Swiss Army Knife of terminal emulators: versatile, robust, proven.

ZOC SSH Features in Detail

ZOC Terminal is based on OpenSSH and supports the latest key exchange and encryption methods that the SSH protocol has to offer.

Unlike OpenSSH, this ssh client is wrapped in a modern tabbed user interface with a powerful host directory, industrial strength emulations and scripting.

Below is an overview and explanation of some core SSH features of ZOC Terminal. We also have a whitepaper offering a more technical description of SSH.

Key Exchange

An especially difficult part of encrypted communication is the need to negotiate a shared secret (the key to use for encryption) over a public channel that could already be compromised.

The negotiation is performed through the so called Diffie-Hellman exchange or one of its many variants. ZOC supports all official diffie-hellman group exchanges, as well as the more modern ecdsa-sha2 and curve25519-sha256 protocols.

Authentication

Authenticating describes the process, where the user presents proof of who he is and the server deciding, if the user should be allowed access. The SSH protocol describes various methods that can be used for authentication.

Of those, ZOC supports password authentication, pukey exchange and keyboard-interactive challenge. Public-key exchange comes in various flavors. ZOC understands RSA, DSA, ECDSA and ED25519 keys. Hardware (smart card) based key authentication is also possible.

Encryption

Over time, the SSH protocol has seen a plethora of methods to be used to encrypt the communication (using shared secret was negotiated during the KEX phase as a cryptograhpic key). Some ciphers were phased out over time, especially after Edward Snowden revealed how powerful possible listeners like the NSA are, and new ones were introduced. ZOC supports the whole list, starting with aes256-ctr and going down to older ciphers like aes256-cbc or arcfour (these older ones may still be necessary to connect to older servers which have not been updated in a while).

Port-Forwarding

An important part of the secure shell protocol is a feature called port-forwarding. This feature allows the user to create a connection from the client computer to the server network, which can be used by other programs and where all the connection data is encrypted. This feature is sometimes called tunneling.

Programs and protocols which do not use data encrpytion (e.g. ftp or rsh) can connect to the tunnel’s port on the client computer and the ssh client will transmit their data through the encrypted ssh connection to the final destination (and vice versa).

For example, a user can set up a port-forwarding (also called ssh-tunnel) on the client software, listening on the client port 5514 and forwarding traffic to the address of an older device on the remote network that only supports the unencrypted rsh protocol.

The user can then use a non-encrypting rsh client, connect it to localhost port 5514 and thus will get connected via the secure shell client to the rsh server on the remote network. A normal rsh client will not encrypt its data, but the ssh client will encrypt all traffic before sending it through the ssh tunnel to the host on the other side (and vice versa) , essentially creating an encrypted rsh connection.

Dynamic Port-Forwarding

The standard port-forwarding feature requires the client to set up the tunnel source port and destination before making the connection. This means that there is limited flexibility and that for each possible destination, a separate ssh tunnel needs to be set up.

This problem is addressed by secure shell’s dynamic port forwarding. With dynamic port forwarding, the client sets up a listening port (as with normal port fowarding), but when a software connects to the port, it can tell the client which host and port it wants to connect to. This is done in the same way that client software can request connections from SOCKS proxies.

The ssh client will then forward the connection request to the secure shell server which makes the connection to the destination host. This way, the ssh client could let an unencrypted ftp software access ftp servers on the remote network through an encrypted data channel.

SSH Connection via Proxy

In some environments, end user computers are not allowed to access the outside internet directly. In those cases, connection and data exchange is made by way of a ssh proxy which handles the actual connection to the outside network (internet). There are various type of proxies, which mainly differ in how the ssh client requests a connection to the outside world. Most common types are SOCKS-4, SOCKS-5 and HTTP.

SSH Agent Forwarding

When a user authenticates an SSH session using a public/private key pair, ZOC supports the SSH agent forwarding technique to provide the key for authentication in secondary ssh sessions (ssh connections to a third server, made from typing a ssh command in the remote shell in the initial connection). If all the servers allow authetication through this specific ssh key pair, it is not necessary to provide the passphrase again for secondary ssh connections.

X11 Forwarding

X11 is a communication protocol which allows a remote computer to run programs with a graphical user interface on a remote computer (normally, the remote computer can only show text in a terminal client). SSH supports a way to tunnel this type of communication between ssh client and server, thus enabling the user to run an X11 command like xeyes on the remote shell and get the window for that displayed on the local computer.

解压密码:所有镜像和压缩文件打开密码均为:osxwin.com
安装方法:见压缩包内Readme!!!.txt

下载列表

版本 语言 更新时间 应用大小 下载
7.23.7 - SN 英文 2019-06-28 5.4 MB 点击下载
7.23.6 - SN 英文 2019-06-19 5.4 MB 点击下载
7.23.5 - SN 英文 2019-06-15 5.4 MB 点击下载
7.23.4 - SN 英文 2019-05-15 5.4 MB 点击下载
7.23.3 - SN 英文 2019-04-14 5.4 MB 点击下载
7.23.2 - SN 英文 2019-03-28 5.3 MB 点击下载

发表回复

请输入您的评论!
请输入名字。