Overview Introduction Privilege Separation OpenSSH Security Performance Conclusion