{"id":163,"date":"2024-08-01T15:22:37","date_gmt":"2024-08-01T15:22:37","guid":{"rendered":"https:\/\/webhostingnoida.in\/blog\/?p=163"},"modified":"2024-08-01T16:00:02","modified_gmt":"2024-08-01T16:00:02","slug":"ssh","status":"publish","type":"post","link":"https:\/\/webhostingnoida.in\/blog\/ssh\/","title":{"rendered":"SSH (Secure Shell) &#8211; Encryption, Authentication, and Advanced Features"},"content":{"rendered":"<h2><\/h2>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#SSH\" >SSH<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Key_Features_of_SSH\" >Key Features of SSH:<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Overview\" >Overview:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Encryption\" >Encryption:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Authentication_Methods\" >Authentication Methods:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Port_Forwarding\" >Port Forwarding:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#File_Transfer_Protocols\" >File Transfer Protocols:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#X11_Forwarding\" >X11 Forwarding:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Tunneling_and_VPN\" >Tunneling and VPN:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Configuration_and_Usage\" >Configuration and Usage:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Security_Considerations\" >Security Considerations:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Common_Tools_and_Implementations\" >Common Tools and Implementations:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Advanced_Features\" >Advanced Features:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Logs_and_Auditing\" >Logs and Auditing:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#Connecting_server_via_SSH_in_linux\" >Connecting server via SSH in linux<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#To_connect_to_a_server_using_SSH_in_Linux_follow_these_steps\" >To connect to a server using SSH in Linux, follow these steps:<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#1_Open_a_Terminal\" >1. Open a Terminal:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#2_Use_the_SSH_Command\" >2. Use the SSH Command:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#3_Example_Command\" >3. Example Command:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#4_Enter_the_Password\" >4. Enter the Password:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#5_Successfully_Connected\" >5. Successfully Connected:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/webhostingnoida.in\/blog\/ssh\/#6_Optional_Using_an_SSH_Key\" >6. Optional: Using an SSH Key:<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1><span class=\"ez-toc-section\" id=\"SSH\"><\/span>SSH<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/miro.medium.com\/v2\/resize:fit:512\/1*8ebQwZcMBgsZ6prLW8p-HA.png\" alt=\"The Complete Overview of SSH: From Basics to Advanced | by i.hrishikesh nate | Medium\" width=\"357\" height=\"357\" \/><\/p>\n<p>SSH (Secure Shell) is a network protocol that allows secure remote access to computers over an unsecured network. It encrypts data, supports various authentication methods (like password and key-based), and is commonly used for logging into remote systems, executing commands, and transferring files securely.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Features_of_SSH\"><\/span>Key Features of SSH:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Overview\"><\/span><strong>Overview:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Purpose<\/strong>: SSH provides a secure way to access and manage remote systems, replacing older protocols like Telnet and rlogin, which transmit data in plaintext and are vulnerable to eavesdropping.<\/li>\n<li><strong>Usage<\/strong>: Commonly used by system administrators to remotely manage <a href=\"https:\/\/www.squarebrothers.in\/hosting\/vps-hosting\" target=\"_blank\" rel=\"noopener\">servers<\/a>, configure network equipment, and perform secure file transfers.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Encryption\"><\/span><strong>Encryption:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Symmetric Encryption<\/strong>: SSH uses symmetric encryption algorithms like AES, DES, or Blowfish to encrypt the data exchanged between the client and server. Both ends of the connection share a secret key generated during the SSH handshake, which is used for encrypting and decrypting the session data.<\/li>\n<li><strong>Asymmetric Encryption<\/strong>: Public-key cryptography is used during the initial handshake to securely exchange the secret key. RSA or ECDSA are common algorithms for this purpose.<\/li>\n<li><strong>Data Integrity<\/strong>: SSH ensures data integrity by using message authentication codes (MACs), which verify that the data has not been tampered with during transmission.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Authentication_Methods\"><\/span><strong>Authentication Methods:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Password Authentication<\/strong>: The user logs in with a username and password. While straightforward, this method is less secure because passwords can be intercepted or guessed.<\/li>\n<li><strong>Public Key Authentication<\/strong>: In this method, the user generates a pair of cryptographic keys (public and private). The public key is placed on the server, and during login, the server challenges the client to prove it possesses the corresponding private key. This is more secure than password-based authentication.<\/li>\n<li><strong>Multi-Factor Authentication (MFA)<\/strong>: SSH can be configured to require additional forms of verification, such as time-based one-time passwords (TOTP) or hardware tokens, adding an extra layer of security.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Port_Forwarding\"><\/span><strong>Port Forwarding:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Local Port Forwarding<\/strong>: Redirects traffic from a local port to a remote server, enabling secure access to services hosted on internal networks.\n<ul>\n<li>Example: Forwarding traffic from a local machine&#8217;s port 8080 to a remote web server&#8217;s port 80.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Remote Port Forwarding<\/strong>: Redirects traffic from a remote server&#8217;s port to a local machine.<\/li>\n<li><strong>Dynamic Port Forwarding<\/strong>: Configures a SOCKS proxy on the local machine, which can be used to route traffic through the SSH server to any destination.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"File_Transfer_Protocols\"><\/span><strong>File Transfer Protocols:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>SCP (Secure Copy Protocol)<\/strong>: A simple and secure way to transfer files between local and remote systems. It works over SSH and uses the same encryption and authentication mechanisms.<\/li>\n<li><strong>SFTP (SSH File Transfer Protocol)<\/strong>: A more feature-rich protocol for file transfer, providing capabilities like directory listing and resuming interrupted transfers. SFTP operates over SSH and ensures that all data is encrypted.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"X11_Forwarding\"><\/span><strong>X11 Forwarding:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Allows graphical applications running on a remote server to be displayed on the local machine. SSH forwards the X11 protocol (used by many Unix\/Linux graphical applications) over the encrypted connection.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Tunneling_and_VPN\"><\/span><strong>Tunneling and VPN:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>SSH can be used to create encrypted tunnels or even a rudimentary VPN, allowing secure communication between different parts of a network. This is useful for securing otherwise unencrypted protocols or accessing internal network resources securely from a remote location.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Configuration_and_Usage\"><\/span><strong>Configuration and Usage:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Client Configuration<\/strong>: SSH clients like OpenSSH can be configured via the <code>~\/.ssh\/config<\/code> file, where you can set default options for connections, such as the default user, port, and identity file (private key).<\/li>\n<li><strong>Server Configuration<\/strong>: The SSH server configuration is typically found in <code>\/etc\/ssh\/sshd_config<\/code>. This file controls various settings like allowed authentication methods, port number, and permitted users.<\/li>\n<li><strong>Common Commands<\/strong>:\n<ul>\n<li><strong>Connecting to a Server<\/strong>: <code>ssh user@hostname<\/code><\/li>\n<li><strong>Copying Files<\/strong>: <code>scp localfile user@hostname:\/remotepath\/<\/code><\/li>\n<li><strong>Starting an SFTP Session<\/strong>: <code>sftp user@hostname<\/code><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Security_Considerations\"><\/span><strong>Security Considerations:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Key Management<\/strong>: It\u2019s crucial to manage SSH keys securely, keeping private keys protected and periodically rotating them.<\/li>\n<li><strong>Firewall Configuration<\/strong>: Restrict SSH access to specific IP addresses using firewalls to reduce the attack surface.<\/li>\n<li><strong>Brute-Force Protection<\/strong>: Use tools like <code>fail2ban<\/code> to prevent brute-force attacks by blocking IPs after multiple failed login attempts.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Common_Tools_and_Implementations\"><\/span><strong>Common Tools and Implementations:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>OpenSSH<\/strong>: The most widely used SSH implementation, available on most Unix-like systems, including Linux and macOS.<\/li>\n<li><strong>PuTTY<\/strong>: A popular SSH client for Windows that supports terminal sessions, file transfers, and other SSH functionalities.<\/li>\n<li><strong>MobaXterm<\/strong>: An advanced Windows terminal that integrates SSH, SFTP, and other network tools.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Advanced_Features\"><\/span><strong>Advanced Features:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Agent Forwarding<\/strong>: Allows you to use your local SSH keys when accessing a remote server, even when making further SSH connections from that remote server.<\/li>\n<li><strong>ProxyJump<\/strong>: Enables connecting to a remote host through an intermediary (jump) host, useful for accessing hosts behind a firewall.<\/li>\n<li><strong>Certificate Authentication<\/strong>: Instead of using raw public keys, SSH can use signed certificates for authentication, which can simplify key management in large environments.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Logs_and_Auditing\"><\/span><strong>Logs and Auditing:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>SSH logs are typically stored in <code>\/var\/log\/auth.log<\/code> or <code>\/var\/log\/secure<\/code> depending on the system. These logs contain information about login attempts, key exchanges, and other SSH-related activities, useful for security monitoring and auditing.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Connecting_server_via_SSH_in_linux\"><\/span>Connecting server via SSH in linux<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/contabo.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-Head_1200x630_SSH-Keys.jpg\" alt=\"ssh keys cover\" width=\"629\" height=\"330\" \/><\/p>\n<div class=\"flex items-center relative text-token-text-secondary bg-token-main-surface-secondary px-4 py-2 text-xs font-sans justify-between rounded-t-md\">\n<h3><span class=\"ez-toc-section\" id=\"To_connect_to_a_server_using_SSH_in_Linux_follow_these_steps\"><\/span>To connect to a server using SSH in Linux, follow these steps:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<h4><span class=\"ez-toc-section\" id=\"1_Open_a_Terminal\"><\/span>1. Open a Terminal:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>You can open the terminal by pressing `Ctrl + Alt + T` on most Linux distributions.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"2_Use_the_SSH_Command\"><\/span>2. Use the SSH Command:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>The basic syntax for the SSH command is:<\/li>\n<\/ul>\n<p>ssh username@hostname_or_ip<\/p>\n<ul>\n<li>Replace `username` with the username you have on the server.<\/li>\n<li>Replace `hostname_or_ip` with the domain name or IP address of the server.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"3_Example_Command\"><\/span>3. Example Command:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>\u00a0If your username is `user` and the server&#8217;s IP address is `192.168.1.10`, you would enter:<br \/>\n&#8220;`<br \/>\nssh user@192.168.1.10<br \/>\n&#8220;`<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"4_Enter_the_Password\"><\/span>4. Enter the Password:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>If this is your first time connecting to this server, you might see a message asking if you want to continue connecting. Type `yes` and press `Enter`.<\/li>\n<li>You will be prompted to enter the password for the user on the remote server.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"5_Successfully_Connected\"><\/span>5. Successfully Connected:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>After entering the correct password, you will be logged into the server and can start issuing commands.<\/li>\n<\/ul>\n<h4><span class=\"ez-toc-section\" id=\"6_Optional_Using_an_SSH_Key\"><\/span>6. Optional: Using an SSH Key:<span class=\"ez-toc-section-end\"><\/span><\/h4>\n<ul>\n<li>If you have an SSH key set up for authentication, you can use it by specifying the key file with the `-i` option:<br \/>\n&#8220;`<br \/>\nssh -i \/path\/to\/your\/private\/key user@hostname_or_ip<br \/>\n&#8220;`<\/li>\n<li>That\u2019s it! You\u2019re now connected to the <a href=\"http:\/\/webhostingnoida.in\">server<\/a> via SSH.<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SSH SSH (Secure Shell) is a network protocol that allows secure remote access to computers over an unsecured network. It encrypts data, supports various authentication methods (like password and key-based), and is commonly used for logging into remote systems, executing commands, and transferring files securely. Key Features of SSH: Overview: Purpose: SSH provides a secure<\/p>\n","protected":false},"author":1,"featured_media":150,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"jetpack_featured_media_url":"https:\/\/webhostingnoida.in\/blog\/wp-content\/uploads\/2024\/07\/not-sending-email-01-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":7,"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"predecessor-version":[{"id":181,"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/posts\/163\/revisions\/181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/media\/150"}],"wp:attachment":[{"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhostingnoida.in\/blog\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}