How Secure Shell Works (SSH)
Comments (3)
- Popular
- New
- Old
You must be signed in to leave a comment
Fadi Alsaidi
21 March 2021, 15:11
I have never seen anyone more dedicated to nostalgia like this guy. Down to the old printers paper roll. just wow
0
Ewerton Backend Developer
12 July 2019, 23:18
But how can the other computer knows how to decode your packets without revealing to anything in the middle?
+2
Seb
8 February 2021, 22:07
Basically the client first contacts the server to initiate a connection.
The server then responds by sending the client its public key and opens a secure channel for the client.
The client then encrypts its messages using the server's public key, which only the server can decrypt using its private key.
Therefore a man-in-the-middle attack should be avoided.
You can find more details on wikipedia ( https://en.wikipedia.org/wiki/Public-key_cryptography and https://en.wikipedia.org/wiki/SSH_(Secure_Shell) ).
Cheers. :-)
+1