TeodoraRowles633

出自 女性百科
於 2013年1月16日 (三) 16:16 由 TeodoraRowles633 (對話 | 貢獻) 所做的修訂 (新页面: SSH is really a common process allowing a shell (command interpreter) to be used over a secure connection. By protected, here, I am talking about that the text is encrypted, authenticated...)

(差異) ←上個修訂 | 最新修訂 (差異) | 下個修訂→ (差異)
前往: 導覽搜尋

SSH is really a common process allowing a shell (command interpreter) to be used over a secure connection. By protected, here, I am talking about that the text is encrypted, authenticated and strength checked. The security stops attackers reading the contents of the data being sent, the certification allows both the client and the host to make sure that they are linked to the other, and not with a intermediate system in a man-in-the-middle strike, and the integrity checking guarantees that the data is not being changed during transit. Together, these three features provide a secure relationship.

Nevertheless, the password based login element communicates your password through this link, to the remote machine, where it's hashed and compared with the stored value in the password file. To many, even though the text is secured, this isn't acceptable. SSH allows the use of public key authentication to login to a server. Here, you add your public key to the server, and keep your private key on the customer device, optionally password protected so that no-one can steal your private key file and use it to get access with out a password.

Now, once the SSH connection is established, the server should check always the validation of the client; that's, ensure it is you signing in. This is formerly done by seeking your password, and comparing it from the stored password hash. Now, the server encrypts a randomly generated symbol against your public key, and sends this to you. The private key associated with your public key, stored in a record to which only you've access, both by password safety, filesystem permissions or other means, is the only key in a position to decrypt this message. Now, your SSH consumer will decrypt the message and send it back once again to the machine, which compares it against the original value. In reality, the validation is usually also examined in the other direction, using the hosts public key, which may be kept by the customer. After the host knows you support the private key which corresponds to people key, it grants you access.

Therefore, you may ask, what is the safety benefit here? Well, no secret information is being transmitted. You're no further transmitting a code, nor are you transmitting many private key file. You are using the keys to encrypt and decrypt an item of time is worked one by random data, which only. Anyone who did somehow find a way to listen in on this data flow would not be able to regain entry by playing back your password, or even by playing back the same data transaction, as an alternative value would be protected the next time you login, and only the private key itself can decrypt that.

Public Key authentication is supported in OpenSSH, and also in PuTTY and many other SSH methods. Always check your methods documentation for details on just how to use public-key based logins. Beginning Web Hosting - Hyper-wiki