Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested


/
Send to a friend Feedback

SSH inventor denied trademark request

Related linksToday's breaking news
Send to a friendFeedback


MINNEAPOLIS - The Internet engineering community rebuffed one of its own security gurus this week, by rejecting a request from the inventor of the popular Secure Shell protocol to change the technology's acronym to protect his company's trademark on the term.

Tatu Ylonen created Secure Shell in 1995 as a way of securing remote login, file transfer, TCP/IP and X11 forwarding. The protocol automatically encrypts, authenticates and compresses transmitted data.

Ylonen published Secure Shell as free software, and the technology is now available from several software vendors, including Sun, Lucent , Nokia and Ericsson. Ylonen's own company, SSH Communications Security of Finland, sells a full suite of cryptography and authentication products based on the Secure Shell protocol.

From the onset, Secure Shell has been commonly referred to as SSH. As the Internet Engineering Task Force wraps up its work to standardize Secure Shell, Ylonen asked the group to change the protocol's acronoym to Secsh or some other phrase to protect his company's trademarks and brand names.

At a contentious meeting held here this week, the IETF's Secure Shell working group denied Ylonen's request, citing concerns that it would set a bad precedent for other trademark claims facing the standards-setting body. The request was denied despite recommendations from Jeff Schiller, co-chair of the IETF's security area, to "be nice."

"Maybe we can find it in our hearts to help out one of our own," Schiller said at the start of the debate.

Ylonen himself argued that "my appeal is as the creator of this thing." Changing his company's name and the brand names of his products to differentiate them from the new IETF standard "will be very expensive," he said.

But IETF participants argued that both Secure Shell and its acronym SSH were generic terms that can't be protected by trademarks. Ultimately, the working group voted 3 to 1 to reject Ylönen's request.

"I'm very disappointed," Ylonen said after the meeting. "What will I do next? Consult my lawyers."

Related Links

SSH Communications Security is at www.ssh.com

 
NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.