{"id":3934,"date":"2022-08-26T17:55:19","date_gmt":"2022-08-26T14:55:19","guid":{"rendered":"http:\/\/turknetwp.local\/?p=3934"},"modified":"2023-01-30T13:34:50","modified_gmt":"2023-01-30T10:34:50","slug":"ssh-secure-shell-nedir","status":"publish","type":"post","link":"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/","title":{"rendered":"SSH (Secure Shell) Nedir?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Siber g\u00fcvenlik kavram\u0131n\u0131 olduk\u00e7a s\u0131k duymu\u015fsunuzdur. Giderek yayg\u0131nla\u015fan siber sald\u0131r\u0131lardan hem kendi bilgilerini korumak hem de i\u015f ortam\u0131nda \u00e7al\u0131\u015fanlar\u0131n\u0131n bilgilerini korumak i\u00e7in \u00e7e\u015fitli \u00f6nlemler almal\u0131s\u0131n\u0131z. Bu durumlarda SSH k\u0131saltmas\u0131n\u0131 da s\u0131kl\u0131kla duymu\u015fsunuzdur. Secure Shell a\u00e7\u0131l\u0131m\u0131na sahip SSH ad\u0131ndan da anla\u015f\u0131laca\u011f\u0131 \u00fczerine bir g\u00fcvenlik protokol\u00fcd\u00fcr. Farkl\u0131 cihazlara g\u00fcvenli uzaktan eri\u015fim imkan\u0131 sunan SSH\u2019nin nas\u0131l kullan\u0131laca\u011f\u0131, ne i\u015fe yarad\u0131\u011f\u0131 ve kullan\u0131c\u0131lar\u0131na sa\u011flad\u0131\u011f\u0131 avantajlar bilinmesi gereken konular aras\u0131ndad\u0131r.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">SSH (Secure Shell) Nedir?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">1995 y\u0131l\u0131nda Finlandiya\u2019da bulunan Helsinki Teknoloji \u00dcniversitesinde ara\u015ft\u0131rmac\u0131 olan Tat\u0131 Ylonen taraf\u0131ndan geli\u015ftirilen SSH protokol\u00fcn\u00fcn amac\u0131 bilgisayarlar \u00fczerinden farkl\u0131 sunuculara ba\u011fland\u0131\u011f\u0131nda \u00fcst\u00fcn bir kimlik do\u011frulamas\u0131 ve korumas\u0131 sa\u011flayarak sunucular\u0131n kimli\u011finin gizli kalmas\u0131n\u0131n sa\u011flanmas\u0131d\u0131r.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Peki, kullan\u0131c\u0131lara g\u00fcvenli uzaktan ba\u011flant\u0131 imkan\u0131 sunan SSH tam anlam\u0131yla nedir? Genel a\u00e7\u0131l\u0131m\u0131 Secure Shell olan SSH, kullan\u0131c\u0131lar\u0131n sunucular\u0131n\u0131 internet \u00fczerinden kontrol edebilmelerini sa\u011flayan ve sunucular \u00fczerinde \u00e7e\u015fitli de\u011fi\u015fiklikler ve d\u00fczenlemeler yapabilme olana\u011f\u0131 tan\u0131yan bir uzaktan y\u00f6netim g\u00fcvenlik protokol\u00fcd\u00fcr. SSH de g\u00fcvenli\u011fi sa\u011flayan bir \u015fifreleme tekni\u011fi vard\u0131r. Bu \u015fifreleme tekni\u011fi sayesinde kullan\u0131c\u0131lar uzaktaki bir sunucuya giden veriler ile yine uzaktaki bir sunucudan gelen verileri korur. bu sayede iki sunucu aras\u0131nda ger\u00e7ekle\u015fen ileti\u015fim y\u00fcksek bir \u015fifreleme tekni\u011fi ile korunur. SSH\u2019nin sa\u011flad\u0131\u011f\u0131 bir tak\u0131m avantajlar vard\u0131r. Bu avantajlardan baz\u0131lar\u0131 \u015fu \u015fekildedir.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Uzaktaki bir kullan\u0131c\u0131n\u0131n kimli\u011fini tespit etmek ve do\u011frulamak.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u0130stemcideki giri\u015f verilerini ana bilgisayara aktarmak.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ana bilgisayardaki \u00e7\u0131kt\u0131lar\u0131 tekrar istemciye g\u00f6ndermek i\u00e7in mekanizma sa\u011flamak.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Shell komutlar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131rabilirsiniz.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">SSH (Secure Shell) <\/span><span style=\"font-weight: 400;\">Ne \u0130\u015fe Yarar?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SSH, protokol\u00fc bilgisayar ile sunucu aras\u0131ndaki ba\u011flant\u0131n\u0131n olu\u015fmas\u0131n\u0131 sa\u011flayan bir a\u011f protokol\u00fcd\u00fcr. <\/span><span style=\"font-weight: 400;\">Kullan\u0131c\u0131lar kulland\u0131klar\u0131 bilgisayar \u00fczerindeki i\u015fletim sistemlerinde bulunan terminal penceresi ile uzaktaki bir sunucuya ba\u011flanarak SSH ba\u011flant\u0131s\u0131 olu\u015fturabilirler. Terminal penceresi genellikle Linux ve macOS i\u015fletim sistemine ait bilgisayarlarda bulunur. Windows i\u015fletim sistemine sahip bir bilgisayar \u00fczerinden SSH ba\u011flant\u0131s\u0131n\u0131 olu\u015fturmak istiyorsan\u0131z Putty ba\u011flant\u0131s\u0131n\u0131 kullanarak sunucuya eri\u015fim sa\u011flayabilirsiniz.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Berkeley, rlogin, rsh gibi farkl\u0131 bir\u00e7ok protokol mevcuttur. Secure Shell bu farkl\u0131 protokollerin yerine daha iyi bir g\u00fcvenlik kontrol\u00fc olmak i\u00e7in olu\u015fturulmu\u015ftur. Di\u011fer bir\u00e7ok protokol sunucu parolas\u0131n\u0131 bir \u015fifreleme tekni\u011fi ile korumad\u0131\u011f\u0131 i\u00e7in g\u00fcvenlik sorunu ortaya \u00e7\u0131kmaktad\u0131r. \u00c7\u00fcnk\u00fc bu protokoller parolalar\u0131 d\u00fcz bir metin olarak g\u00f6ndermektedir. D\u00fcz bir metin olarak g\u00f6nderilen parolalar savunmas\u0131z oldu\u011fu i\u00e7in siber tehditlere de a\u00e7\u0131k olmaktad\u0131r. Oysa SSH i\u00e7erisinde bar\u0131nd\u0131rd\u0131\u011f\u0131 \u015fifreleme tekni\u011fi sayesinde daha \u00fcst koruma sa\u011flad\u0131\u011f\u0131 i\u00e7in g\u00fcvenlik d\u00fczeyini de olduk\u00e7a artm\u0131\u015ft\u0131r.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">SSH Nas\u0131l Kullan\u0131l\u0131r?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">SSH protokol\u00fcn\u00fc kurmak olduk\u00e7a kolayd\u0131r. Bunun i\u00e7in \u00f6nce hangi i\u015fletim sistemine sahip bir bilgisayar kulland\u0131\u011f\u0131n\u0131z\u0131 bilmeniz gerekmektedir. \u00c7\u00fcnk\u00fc Linux ve Mac cihazlar\u0131nda SSH ba\u011flant\u0131s\u0131 Terminal sayfas\u0131 \u00fczerinden ger\u00e7ekle\u015firken Windows sistemli bir bilgisayar \u00fczerinden SSH ba\u011flant\u0131s\u0131 \u00e7e\u015fitli programlar \u00fczerinden ger\u00e7ekle\u015ftirilir. Windows i\u015fletimine sahip bilgisayardan SSH ba\u011flant\u0131s\u0131 kurmak i\u00e7in genellikle Putty program\u0131 tercih edilir.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">SSH ba\u011flant\u0131s\u0131n\u0131 kullanarak uzaktaki bir sunucuya ba\u011fland\u0131\u011f\u0131nda baz\u0131 komutlarda kar\u015f\u0131n\u0131za \u00e7\u0131kmaktad\u0131r. Her bir komutun bir anlam\u0131 ve \u00f6zelli\u011fi vard\u0131r. Bir ba\u011flant\u0131 ger\u00e7ekle\u015ftirmeden \u00f6nce bu komutlar\u0131n bilinmesinde yarar vard\u0131r. Bu komutlar olduk\u00e7a fazlad\u0131r fakat \u00e7ok s\u0131k kar\u015f\u0131la\u015f\u0131lan komutlardan baz\u0131lar\u0131 \u015fu \u015fekildedir:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">mkdir: Yeni bir dizinin olu\u015fturulmas\u0131 amac\u0131yla kullan\u0131l\u0131r.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">rmdir: Zaten var olan bir dizini silmek i\u00e7in kullan\u0131lan komuttur.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">cd: Dizinler aras\u0131nda belirlenen dizine ge\u00e7i\u015f yapmak i\u00e7in kullan\u0131l\u0131r.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">cd: Bir \u00fcst dizine ge\u00e7i\u015fte kullan\u0131l\u0131r.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Rm: Dosyalar\u0131 silen komuttur.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">G\u00fcvenlik giderek artan bir problemdir. Uzaktan ger\u00e7ekle\u015ftirilen sunucu ba\u011flant\u0131lar\u0131nda g\u00fcvenli\u011fi \u00fcst d\u00fczeyde tutmak i\u00e7in \u00e7e\u015fitli \u015fifreleme teknikleri kullan\u0131l\u0131r. Bu tekniklerin neler oldu\u011funu bilmek ve SSH protokol\u00fc \u00fczerinden verilen komutlar\u0131n\u0131n neler oldu\u011funu bilmek \u00e7ok \u00f6nemlidir.\u00a0 <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siber g\u00fcvenlik kavram\u0131n\u0131 olduk\u00e7a s\u0131k duymu\u015fsunuzdur. Giderek yayg\u0131nla\u015fan siber sald\u0131r\u0131lardan hem kendi bilgilerini korumak hem de i\u015f ortam\u0131nda \u00e7al\u0131\u015fanlar\u0131n\u0131n bilgilerini korumak i\u00e7in \u00e7e\u015fitli \u00f6nlemler almal\u0131s\u0131n\u0131z. Bu durumlarda SSH k\u0131saltmas\u0131n\u0131 da s\u0131kl\u0131kla duymu\u015fsunuzdur. Secure Shell a\u00e7\u0131l\u0131m\u0131na sahip SSH ad\u0131ndan da anla\u015f\u0131laca\u011f\u0131 \u00fczerine bir g\u00fcvenlik protokol\u00fcd\u00fcr. Farkl\u0131 cihazlara g\u00fcvenli uzaktan eri\u015fim imkan\u0131 sunan SSH\u2019nin nas\u0131l kullan\u0131laca\u011f\u0131, ne [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-3934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-teknolojileri"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SSH (Secure Shell) Nedir? - Turknet Blog<\/title>\n<meta name=\"description\" content=\"SSH (Secure Shell) nedir, ne i\u015fe yarar ve nas\u0131l kullan\u0131l\u0131r? Detayl\u0131 bilgi almak i\u00e7in internet sitemizi ziyaret edebilirsiniz.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SSH (Secure Shell) Nedir? - Turknet Blog\" \/>\n<meta property=\"og:description\" content=\"SSH (Secure Shell) nedir, ne i\u015fe yarar ve nas\u0131l kullan\u0131l\u0131r? Detayl\u0131 bilgi almak i\u00e7in internet sitemizi ziyaret edebilirsiniz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/\" \/>\n<meta property=\"og:site_name\" content=\"Turknet Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-26T14:55:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-30T10:34:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.turk.net\/blog\/wp-content\/uploads\/ssh-secure-shell-nedir-2x.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1128\" \/>\n\t<meta property=\"og:image:height\" content=\"752\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Turknet Blog Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Turknet Blog Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/\",\"url\":\"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/\",\"name\":\"SSH (Secure Shell) Nedir? - Turknet Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.turk.net\/blog\/#website\"},\"datePublished\":\"2022-08-26T14:55:19+00:00\",\"dateModified\":\"2023-01-30T10:34:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.turk.net\/blog\/#\/schema\/person\/be66cf5fa51316d9ae87676100375fca\"},\"description\":\"SSH (Secure Shell) nedir, ne i\u015fe yarar ve nas\u0131l kullan\u0131l\u0131r? Detayl\u0131 bilgi almak i\u00e7in internet sitemizi ziyaret edebilirsiniz.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.turk.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0130nternet Teknolojileri\",\"item\":\"https:\/\/www.turk.net\/blog\/kategoriler\/internet-teknolojileri\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SSH (Secure Shell) Nedir?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.turk.net\/blog\/#website\",\"url\":\"https:\/\/www.turk.net\/blog\/\",\"name\":\"Turknet Blog\",\"description\":\"Blog Yaz\u0131lar\u0131 ve Makaleler\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.turk.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.turk.net\/blog\/#\/schema\/person\/be66cf5fa51316d9ae87676100375fca\",\"name\":\"Turknet Blog Admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SSH (Secure Shell) Nedir? - Turknet Blog","description":"SSH (Secure Shell) nedir, ne i\u015fe yarar ve nas\u0131l kullan\u0131l\u0131r? Detayl\u0131 bilgi almak i\u00e7in internet sitemizi ziyaret edebilirsiniz.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/","og_locale":"tr_TR","og_type":"article","og_title":"SSH (Secure Shell) Nedir? - Turknet Blog","og_description":"SSH (Secure Shell) nedir, ne i\u015fe yarar ve nas\u0131l kullan\u0131l\u0131r? Detayl\u0131 bilgi almak i\u00e7in internet sitemizi ziyaret edebilirsiniz.","og_url":"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/","og_site_name":"Turknet Blog","article_published_time":"2022-08-26T14:55:19+00:00","article_modified_time":"2023-01-30T10:34:50+00:00","og_image":[{"width":1128,"height":752,"url":"https:\/\/www.turk.net\/blog\/wp-content\/uploads\/ssh-secure-shell-nedir-2x.jpg","type":"image\/jpeg"}],"author":"Turknet Blog Admin","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Turknet Blog Admin","Tahmini okuma s\u00fcresi":"4 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/","url":"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/","name":"SSH (Secure Shell) Nedir? - Turknet Blog","isPartOf":{"@id":"https:\/\/www.turk.net\/blog\/#website"},"datePublished":"2022-08-26T14:55:19+00:00","dateModified":"2023-01-30T10:34:50+00:00","author":{"@id":"https:\/\/www.turk.net\/blog\/#\/schema\/person\/be66cf5fa51316d9ae87676100375fca"},"description":"SSH (Secure Shell) nedir, ne i\u015fe yarar ve nas\u0131l kullan\u0131l\u0131r? Detayl\u0131 bilgi almak i\u00e7in internet sitemizi ziyaret edebilirsiniz.","breadcrumb":{"@id":"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.turk.net\/blog\/ssh-secure-shell-nedir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.turk.net\/blog\/"},{"@type":"ListItem","position":2,"name":"\u0130nternet Teknolojileri","item":"https:\/\/www.turk.net\/blog\/kategoriler\/internet-teknolojileri\/"},{"@type":"ListItem","position":3,"name":"SSH (Secure Shell) Nedir?"}]},{"@type":"WebSite","@id":"https:\/\/www.turk.net\/blog\/#website","url":"https:\/\/www.turk.net\/blog\/","name":"Turknet Blog","description":"Blog Yaz\u0131lar\u0131 ve Makaleler","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.turk.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/www.turk.net\/blog\/#\/schema\/person\/be66cf5fa51316d9ae87676100375fca","name":"Turknet Blog Admin"}]}},"_links":{"self":[{"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/posts\/3934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/comments?post=3934"}],"version-history":[{"count":12,"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/posts\/3934\/revisions"}],"predecessor-version":[{"id":3982,"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/posts\/3934\/revisions\/3982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/media\/4848"}],"wp:attachment":[{"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/media?parent=3934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/categories?post=3934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.turk.net\/blog\/wp-json\/wp\/v2\/tags?post=3934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}