SecureBlackbox Knowledge Base

Recent SSH Articles


What SSH algorithms are implemented in SecureBlackbox?

SecureBlackbox contains client-side support for SSH 1 and SSH 2...

Why does the Active property return true when the connection has closed?

The Active property, when set, indicates that the connection was successful and the component was ready to perform its actions. However, if the connection was lo…

What SSH algorithms are implemented in SecureBlackbox?

Enumerates the SSH and SFTP algorithm support implemented in SecureBlackbox.

The server won't execute a command that other clients execute fine. What should I do?

What to do when the server won't execute a command that other clients work fine.

I can't login to the server with my username and password, but I can login to other programs fine. Is this a bug?

Most likely, the server is using not password-based authentication, but keyboard-interactive authentication. SecureBlackbox supports both authentication types. F…

Why does the Active property return true when the connection has closed?

The Active property, when set, indicates that the connection was successful and the component was ready to perform its actions. However, if the connection was lo…

X.509 Certificates and SSH

The article describes how to use X.509 certificates for public-key authentication in SSH-secured communications.