![]() If Machine A really is Machine A then it will have the private key that can decrypt the random secret number and send it back to Machine B.Īt this point the target machine knows that the machine trying to connect to it is authenticated and the connecting machine already knows the correct user is logged on. To do this Machine B will generate a large random number, encrypt it with the public key of Machine A and send it over to Machine A. Now, whenever Machine A tries to connect to Machine B, B will tell A to prove that it really is Machine A. We want Machine B to allow access to Machine A, so Machine A needs to generate a private and public key and Machine B gets the public key. So let’s assume we have two different machines called A and B. The Public Key allows whoever has it to encrypt anything that only the machine that has the corresponding private key can decrypt. The Public key is a key we distribute to other machines to prove that it is really us who are trying to connect to them. The private key as the name implies is a key which only our specific machine knows and has to be kept secret. In Public Key Authentication one has two keys: a private key and a public key. Let’s think about this – the local machine already knows it’s us or else it wouldn’t have allowed us to log on right? So why can’t our machines just talk between themselves and vouch for us much like the Schengen area in Europe? Well, they can! We can do this using Public Key Authentication. This is achieved by the remote machine assuming that only the authorised user knows the correct login and password. What are login and password used for? When we input a login and password we’re telling the remote machine ‘yeah I promise I really am the user that has permission to use you’. One inconvenience with SSH, like with so many other remote connecting tools, is that you have to provide a login and a password each time you want to log in to a target machine but is this really necessary? It might surprise you that the answer is no, not really. SSH can also be instructed to automatically forward an X server session to the local X Server. With SSH one can create tunnels – that is have the local machine listening on a specific port and pass whatever it receives through the tunnel and send it to a specified destination. It’s a secure way to log into a machine remotely but can also do a lot more. SSH is a very useful tool for anyone using Linux Environments. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |