Secure Shell (SSH)

SSH is a protocol that aim to establish a secure #202206151232 connection between two computers. It uses the #202203221212 in order to secure the network communication between two hosts. Additionally, one could utilise the 202203221227# feature in order to Encapsulation# one Protocol (usually insecure) under SSH thus enhance the security of the protocol.

The keys are encrypted using one of the supported cryptographic algorithms such as dsa, rsa, ecdsa, ecdsa-sk, ed25519 or ed25519-sk. Such keys are usually stored in the /etc/ssh as ssh_host_rsa_key and ssh_host_dsa_key alongside with its configuration# files sshd_config and ssh_config. You can 202204272031# to other computers using the command ssh-copy-id.

Upon key changes, SSH will inform the user about that change before the user accept the key change anyway. The key change could be tampering so examine such changes with cautious.

Links to this page
#cryptography #networking