Perea

来自女性百科
跳转至: 导航搜索

SSH is just a common process allowing a shell (command interpreter) to be properly used over a secure relationship. By protected, here, I mean that the connection is secured, authenticated and strength tested. The security prevents attackers reading the contents of the data being transmitted, the verification allows both the client and the host to be certain that they're connected to the other, and not to some intermediate system in a man-in-the-middle attack, and the integrity checking ensures that the data is not being changed during transit. Together, these three functions give a secure connection.

Nevertheless, the password based login feature transfers your password through this link, to the remote host, where it is hashed and weighed against the stored value in the password file. To a lot of, despite the fact that the text is secured, this is not sufficient. SSH allows the usage of public key authentication to login to a machine. Here, you publish your public key to the machine, and keep your private key on the client device, optionally password protected in order that no one can steal your private key file and use access to be gained by it without a password.

Now, when the SSH link is established, the machine will need to check the authorization of the client; that's, make certain it is you signing in. This is formerly done by seeking your password, and comparing it from the stored password hash. Now, the server encrypts a randomly generated token against your public key, and sends this for you. The private key connected with your public key, stored in a file to which only you have access, either by password defense, filesystem permissions or other means, could be the only key able to decrypt this message. Now, your SSH client will decrypt the message and send it back again to it is compared by the server, which against the original price. In fact, the certification is frequently also examined in the opposite direction, using the servers public key, which may be kept by the client. It allows you access, after the server knows you support the private key which corresponds to people key.

So, you might ask, what's the security benefit here? Well, no secret information is being given. You are no more transmitting a password, nor are you transmitting any of your private key file. You are utilising the keys to decrypt and encrypt a bit of random data, which works onetime only. Anyone who did somehow manage to listen in on this data flow wouldn't be able to restore access by playing back your code, or even by playing back the same data deal, as a different value would be protected the next time you login, and only the private key itself can decrypt that.

Public Key authentication is supported in OpenSSH, and also in PuTTY and a number of other SSH methods. Examine your methods documentation for precisely how exactly to use public-key based logins. found it