Apple's Terminal app on the Mac is a great tool for diving into the command line, but it isn't the only option available. ZOC is a terminal app and SSH client. It emulates Emulations. When comparing iTerm2 vs ZOC Terminal, the Slant community recommends iTerm2 for most people.In the question“What are the best terminal emulators for Mac?” iTerm2 is ranked 1st while ZOC Terminal is ranked 3rd. The most important reason people chose iTerm2 is. Jun 04, 2019 Zoc. Zoc is a professional terminal emulator for Mac and Windows platforms with an impressive list of features including tabbed sessions with thumbnails, over 200 commands of scripting language, communication via several protocols not excluding SSH, Rlogin, and Wse, an address book with folders and color-coded hosts, client automation with.
ZOC is the terminal emulator that is ideal for those who need to access Unix shell accounts from a Windows platform. Terminal Emulator for Windows and macOS - Features and List of Emulations for ZOC Terminal Emulator. ZOC is a professional, modern and well-established terminal emulator and telnet client and it is known for its configurability and outstanding user interface. The purpose of the program is to let you access character based hosts using Secure Shell (SSH), telnet (rfc854), RS232/serial and many other means of communication.
ZOC SSH Features in Detail
ZOC is based on OpenSSH and supports the latest key exchange and encryption methods that the SSH protocol (RFC 4253) has to offer.
Unlike OpenSSH, this ssh client is wrapped in a modern tabbed user interface with a powerful host directory, industrial strength emulations and scripting.
Below is an overview and explanation of some core SSH features of ZOC Terminal. We also have a whitepaper offering a more technical description of SSH.
Key Exchange
An especially difficult part of encrypted communication is the need to negotiate a shared secret (the key to use for encryption) over a public channel that could already be compromised.
Zoc Terminal For Mac Catalina
The negotiation is performed through the so called Diffie-Hellman exchange or a variant thereof. ZOC supports all official diffie-hellman group exchanges, as well as the more modern ecdsa-sha2 and curve25519-sha256 protocols.
Authentication
Authenticating describes the process, where the user presents proof of who he is and the server deciding, if the user should be allowed access. The SSH protocol describes various methods that can be used for authentication.
Of those, ZOC supports password authentication, pukey exchange and keyboard-interactive challenge. Public-key exchange comes in various flavors. ZOC understands RSA, DSA, ECDSA and ED25519 keys. It is also possible to use hardware based key authentication (e.g. smart cards).
Encryption
Over time, the SSH protocol has seen a plethora of methods to be used to encrypt the communication (using shared secret was negotiated during the KEX phase as a cryptograhpic key). Some ciphers were phased out over time, especially after Edward Snowden revealed how powerful possible listeners like the NSA are, and new ones were introduced. ZOC supports the whole list, starting with aes256-ctr and going down to older ciphers like aes256-cbc or arcfour (these older ones may still be necessary to connect to older servers which have not been updated in a while).
Zoc Terminal For Mac Catalina
Static Port-Forwarding
An important part of the secure shell protocol is a feature called port-forwarding. This feature allows the user to create a connection from the client computer to the server network, which can be used by other programs and where all the connection data is encrypted. This feature is sometimes called tunneling.
Dynamic Port-Forwarding
The standard port-forwarding feature requires the client to set up the tunnel source port and destination before making the connection. This means that there is limited flexibility and that for each possible destination, a separate ssh tunnel needs to be set up. With dynamic port forwarding however, the client sets up a listening port, but when a software connects to the port, it can select host and port it wants to connect to. The ssh client will then forward the connection request to the SSH server which initiates the connection to the final destination.
SSH Connection via Proxy
In some environments, end user computers are not allowed to access the outside internet directly. In those cases, connection and data exchange is made by way of a ssh proxy which handles the actual connection to the outside network (internet). There are various type of proxies, which mainly differ in how the ssh client requests a connection to the outside world. Most common types are SOCKS-4, SOCKS-5 and HTTP. ZOC supports connections through those types, as well as connections made through ssh-jumpservers.
SSH Agent Forwarding
When a user authenticates an SSH session using a public/private key pair, ZOC supports the SSH agent forwarding technique to provide the key for authentication in secondary ssh sessions (ssh connections to a third server, made from typing a ssh command in the remote shell in the initial connection). If all the servers allow authetication through this specific ssh key pair, it is not necessary to provide the passphrase again for secondary ssh connections.
X11 Forwarding
X11 is a communication protocol which allows a remote computer to run programs with a graphical user interface on a remote computer (normally, the remote computer can only show text in a terminal client). SSH supports a way to tunnel this type of communication between ssh client and server, thus enabling the user to run an X11 command like xeyes on the remote shell and get the window for that displayed on the local computer.