EldoS | Feel safer!

Software components for data protection, secure storage and transfer

Make SSH client and server functionality accessible via PHP Web pages


SecureBlackbox product diagram

SSHBlackbox makes it easy to embed SSH access into PHP Web pages. Build Web-based SSH clients in minutes or create a fully-featured SSH server to handle secure remote access and secure port forwarding (secure tunneling).

The SSH (Secure Shell) protocol is a de-facto standard for securing remote sessions and file transfers. SSH enables secure login sessions over the Internet. The SSH standard specifies a flexible choice of authentication, encryption and compression schemes, allowing SSH clients and servers built by different manufacturers to seamlessly interact regardless of the options. Originally developed by commercial organization for securing remote shell access, SSH has evolved into a comprehensive standard enabling secure port forwarding and tunneling multiple TCP connections over a single secured connection.

SSHBlackbox (PHP edition, part of SecureBlackbox) provides a set of SSH functions for PHP Web servers.

Download and try now

Download SecureBlackbox (PHP edition) including SSHBlackbox

Why choose SSHBlackbox

  • Implement Secure Shell access or execute remote commands in minutes with ElSimpleSSHClient
  • Easy port forwarding (SSH tunneling) with ElSimple*PortForwarding
  • Supports dynamic port forwarding via built-in SOCKS5 server
  • Allows building SSH channels for other clients
  • Build your own SSH server with TElSSHServer or TElSimpleSSHServer class
  • Build Web-based SSH clients with full control over the SSH connection including multiple tunnels (TElSSHClient class)
  • Server-side class library perfect for building Web applications (PHP)
  • Includes free developer-level tehcnical support since the beginning of your evaluation period

Main features of SSH PHP classes

  • Client-side class library for PHP allow building Web-based SSH clients question mark
  • Includes shell, command, port forwarding, X11, and custom subsystems question mark
  • SSH key creation and management functionality question mark
  • Supports Secure File Transfer (SFTP) via SFTPBlackbox
  • Synchronous and asynchronous operation modes question mark
  • No third-party dependencies question mark
  • Royalty-free licensing question mark
  • Plenty of sample code
  • Unlike free open source code, SecureBlackbox comes with free developer-level technical support question mark
Check the complete list of features.



Download SecureBlackbox (PHP) including SSHBlackbox

Read more about SSHBlackbox

Compression gives an additional level of security and lets you increase transfer speed significantly and reduce the network load and storage space requirements.

Synchronous operation mode gives you a linear programming approach without complicated callback functions. This approach saves your development time and reduces the number of errors.

Asynchronous operation mode, on the other hand, gives you flexibility and complete control over your application communications.

Synchronous operation mode gives you a linear programming approach without complicated callback functions. This approach saves your development time and reduces the number of errors. Simple SecureBlackbox components can be used for reliable data transfer no matter what type of proxy or firewall is used to protect the network.
HTTPS proxy access includes support for Basic, Digest and Windows Integrated (NTLM) authentication mechanisms.
You can process huge files and not be bound by restrictions of 32-bit environments. This feature works on both 32-bit and 64-bit systems without any limitations. To limit and control network load and bandwidth consumption you can setup maximum upload and download speed for the data transfer components. Transport (SSL, FTP, HTTP, SMTP, POP3, IMAP, WebDAV, LDAP, SSH, SFTP) components can be used in IPv6 networks without any problems, address conversions or packet wrapping. Transport (SSL, FTP, HTTP, SMTP, POP3, IMAP, WebDAV, LDAP, SSH, SFTP) components understand and make use of non-latin domain names (so-called International Domain Names, IDN). In FIPS operation mode SecureBlackbox uses only certified CryptoAPI modules of Windows to perform any cryptographic operations.
FIPS mode is available only on Windows platform.
Virtual File System adapters let SecureBlackbox components, which operate with files, work with various backend file storages and not just with "physical" disk.
For example, in WebDAV, SFTP, HTTP(S) and FTP(S) servers you can provide a personal storage space for each connected user.
Out of the box file system adapter and SolFS virtual file system adapter are included and you can easily create your own adapter.
With DNSSEC support enabled you protect your socket connection from being fooled by possible DNS cache poisoning and other malicious DNS activities.
DNSSEC requires that the DNS record for the destination server contains a certified signature.
Distributed Crypto modules let web site visitors use certificates accessible only on the client system to sign the data, stored on the server (no need to download this data).
This is done with help of client-side modules (Java applet, ActiveX control, Flash applet), embedded into the web page.
Cryptographic hardware gains more and more popularity every day. If your software deals with X.509 certificates or PKI in general (RSA keys etc.), it is time to support cryptocards and USB tokens.
To use cryptographic hardware you need a license for PKIBlackbox.
SecureBlackbox was written from the ground up by EldoS developers. It doesn't use third-party code to implement its cryptographic functions. This means that you are not bound by CryptoAPI or OpenSSL version when you need to use certain algorithm.
At the same time it's possible to plug third-party security libraries and hardware modules by utilizing the pluggable architecture of SecureBlackbox.
No royalties means the licensing procedure which is clear and easy to understand and manage. Pay for the license once and use it for development and deployment with no other payments. We provide free technical support via web-based Forum and HelpDesk. Support is available for everyone, and the requests from clients who purchased a license are given priority. Also you can use our extensive knowledgebase. With SecureBlackbox you can create and convert SSH keys without the need for external key management software. SSHBlackbox package includes functions that let you generate and manage SSH keys in several formats. SecureBlackbox is the only component collection that lets you build SSH servers as well as SSH clients. Client-side components support connecting to old but still used SSH 1 servers as well as modern SSH 2 servers. With the wide choice of encryption, authentication and key exchange algorithms supported by SSHBlackbox, you will be able to meet the security requirements and get compatibility with the wide choice of differently configured servers and clients. SSH and SFTP protocols offer the number of very useful features, which don't actually require TCP transport. The protocols can be used with any low-level transport protocols, and SecureBlackbox makes this possible. SSH protocol can transport many connections of different types over one secured SSH connection. Tunnels are the types of simultaneous transport that you can use. It's handy to have an SFTP tunnel used in parallel with SSH shell tunnel so that you can transfer files and operate remote system at the same time.

SecureBlackbox supports all types of tunnels, defined by SSH protocol specification.

SSH protocol can transport many connections of different types over one secured SSH connection. Tunnels are the types of simultaneous transport that you can use. Ability to open and close connections on-the-fly extends your possibilities and adds flexibility to your application. SSH protocol can transport many connections of different types over one secured SSH connection. Tunnels are the types of simultaneous transport that you can use. Ability to create custom tunnel types (subsystems) extends your possibilities and adds flexibility to your application. Shell and command tunnels are used to execute commands on the remote system by using terminal / shell application (in shell tunnels) or by executing the commands directly (using command tunnels). Support for both types of tunnels adds flexibility to your application by letting you execute commands without parsing the shell prompts and extra messages or emulating a full-featured terminal. With extensive authentication support you can build multi-level authentication schemes, thus increasing security and reducing the risks when the sensitive resources are accessed.
|

Back to top

As of July 15, 2016 EldoS Corporation will operate as a division of /n software inc. For more information, please read the announcement.

Got it!