Intro to SSH and SSH Keys

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 120

  • @mattjoe67
    @mattjoe67 5 лет назад +20

    Thank you very much for simple and extremely easy way explaining SSH, some instructors or professors make things very difficult for their students, those instructors want to feel important and smart by not sharing the simple and easy method with their students, I hope you make more videos thank you, Sir.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад +1

      Thank you very much for the feedback. I'm sorry that I didn't respond earlier. I really do appreciate it.

    • @Thmyris
      @Thmyris 4 года назад +1

      Big ego teachers are indeed super annoying. I'm in love with some of my teachers who have big stats in humility, like this youtuber :)

  • @punjabimitti
    @punjabimitti 4 года назад +2

    Excellent presentation with soothing voice, context, perspective and technical details.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      I’m glad you liked it, Sunil. Thanks for the kind words.

  • @אליהובראל
    @אליהובראל 7 лет назад

    I've searched lot of videos, and this is the first one that explain this topic so well.
    Very good explanation, it helped me alot. thanks

  • @shivmmehrotra
    @shivmmehrotra 5 лет назад +1

    By far best video on ssh keys on youtube

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад

      Wow, Shivam. That is quite a compliment. Thank you very much for taking the time to provide your feedback. I’m glad you liked it.

  • @abhi_galav
    @abhi_galav 6 лет назад

    This is certainly the best explanation on this topic

  • @ameyapatil1139
    @ameyapatil1139 8 лет назад +1

    Absolutely brilliant ! Helped my understand this vague concept in just few minutes

  • @ayasswain
    @ayasswain 6 лет назад +2

    Excellent video on SSH. Very nice explanation.

  • @pkelly20091
    @pkelly20091 5 лет назад +1

    You have a great ability in explaining things in a simple way which is refreshing

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад

      Thank you very much for the feedback. It means a lot to me. I'm glad you found the videos helpful.

  • @sergeiromanoff
    @sergeiromanoff 8 лет назад +5

    Great video! The only thing worth mentioning is the relation between the private and public keys. A message encrypted with the private key can be decrypted only with the corresponding public key. And the public key can decrypt only those messages encrypted with the corresponding private one.

    • @ayasswain
      @ayasswain 6 лет назад

      You nailed it. I was also thinking about the same. He should have told this in this video. But still its a great video. He has explained the concept quite well.

    • @dmitryrukavishnikov6711
      @dmitryrukavishnikov6711 6 лет назад

      Did you mean that private key can decrypt messages encrypted with corresponding public key in your last sentence ?

    • @Beliedat
      @Beliedat 6 лет назад

      Umm no asymmetric cryptography works differently...the private can ONLY decrypt and the public key can ONLY encrypt. The public key cannot decrypt a message it has encrypted (if it could that means anybody with the public key could decrypt a message encrypted by another user with the same public key)

  • @cyberguide_in
    @cyberguide_in 3 года назад +1

    Wow... an extremely insightful video.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад

      Thank you, One Step Ahead. I’m glad you found it helpful.

  • @the-sunny-side-up
    @the-sunny-side-up 4 года назад +1

    Lively and lucid, as always!! Thanks Paul for making my life so easy :)

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад +1

      Wow! If I’m making your life easy, I have to go back and watch that video. I need some of that ;-)
      Seriously, thanks for your generous comment, Arkadeep. It puts a big smile on my face.

  • @iamsiddhantsahu
    @iamsiddhantsahu 6 лет назад

    Superb explanation, cleared all my doubts about ssh!

  • @Marceau.
    @Marceau. 7 лет назад +7

    you should make more videos, they are really well done :)

  • @tapsulinka
    @tapsulinka 4 года назад +2

    SSH was developed by Tatu Ylönen. He was my friend at student time 😊😊

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      Thank you for sharing that you were in school with Tatu! He clearly has been a leader in a variety of areas of security.

  • @lubeda04
    @lubeda04 6 лет назад

    Very good introduction to this technology. It helped me a lot.

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Glad it was helpful, Ludger. Thank you for taking the time to provide the feedback.

  • @davidstandish1482
    @davidstandish1482 7 лет назад

    Thx for posting Paul. Nice primer.

  • @KeepItTechie
    @KeepItTechie 7 лет назад +1

    Great video Paul. I really enjoyed how you broke SSH down.

  • @lesliedrozario5890
    @lesliedrozario5890 3 года назад +1

    Excellent explanation Paul. I am just about stepping into SSH world and your video has given me a great start. Make more videos if possible :P

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад

      The SSH world is awesome. Lots to learn and endless challenges ;-). I’m sure you’ll enjoy it. You might look up the NIST document that Tatu and I co-authored with NIST. You might find it helpful. I’ll do my best to get a couple of videos out this summer. This darn day job keeps me busy, and it’s lots of fun ;-)

    • @lesliedrozario5890
      @lesliedrozario5890 3 года назад

      @@PaulTurnerChannel Indeed, the little that I have picked up from your videos makes me believe it's going to fun working on SSH 😉. BTW... Where can I find the NIST document you mentioned. Please guide if possible 🙏

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад +1

      nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf
      For some reason, it was slow to download this morning.

    • @lesliedrozario5890
      @lesliedrozario5890 3 года назад

      @@PaulTurnerChannel Thanks a ton

  • @inderdhami2001
    @inderdhami2001 8 лет назад +9

    Best video on How SSH really works.. thanks!!
    Is there any video on resolving the plethora of keys or inventory management?

    • @PaulTurnerChannel
      @PaulTurnerChannel  8 лет назад +1

      Thanks for the feedback, Inderpal. I've been remiss in getting that video done. I'll work on getting something uploaded soon. Thanks again.

  • @RajanSingh-kr7pg
    @RajanSingh-kr7pg 7 лет назад

    Thanks for the concept. Very nicely done !!

  • @piyushkhare3394
    @piyushkhare3394 4 года назад +1

    Please make more videos...Thanks a lot for this video.....

  • @thedr00
    @thedr00 5 лет назад +3

    This was excellent. Thank you for sharing.

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад

      Thanks a bunch for taking the time to send a comment. I really appreciate it. I’m glad it was helpful.

  • @chandrasekharavajpayeemadd2494

    are these keys persistent ? What should we do make sure keys are persistent?

  • @ErsanYolcu
    @ErsanYolcu 6 лет назад

    Amazing explanation. Thanks a lot for the time you have spent to share all these information.

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Thank you for the feedback, Ersan. I really appreciate it.

  • @marcoangelo
    @marcoangelo 7 лет назад +41

    man, turn your audio up

    • @PaulTurnerChannel
      @PaulTurnerChannel  7 лет назад +8

      Thanks, Marco. That was one of my earlier videos before I understood that my phone headset wouldn't hack it as a recording device. Some of us are slow to learn. I appreciate the feedback.

    • @marcoangelo
      @marcoangelo 7 лет назад +10

      Paul Turner sorry hope I didn't sound too rude. Thank you.

    • @PaulTurnerChannel
      @PaulTurnerChannel  7 лет назад +6

      Not at all. I appreciated the feedback. Thanks

    • @agfagaevart
      @agfagaevart 6 лет назад +2

      cool soothing HAL 9000 type voice... :-)

    • @JohnKatiku
      @JohnKatiku 5 лет назад

      @@PaulTurnerChannel You made it audible too thank you.

  • @ujjwalghatak3787
    @ujjwalghatak3787 5 лет назад +1

    very good, thanks for sharing your knowledge

  • @ibrahimmarin3541
    @ibrahimmarin3541 7 лет назад +1

    You make it very easy to understand! Great Job!

  • @JohnKatiku
    @JohnKatiku 5 лет назад

    This is a Good Listen Thank you. Is there an update to this can follow and how to mitigate the risks ..?

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад

      I’m very sorry for the slow response, Katiku. I created two other videos that discussed SSH components, risks, and best practices. The first one is here: ruclips.net/video/PXi-39elr6Y/видео.html The second one is the furthest I’ve gotten on providing suggestions for addressing the risks in my videos. It is here: ruclips.net/video/dr8W34hautc/видео.html If you’d like a copy of the spreadsheet that is used for the metrics, reply to this comment and I’ll see what I can do. Thank you very much for taking the time to reach out.

  • @wirelessnerd7131
    @wirelessnerd7131 4 года назад +1

    Thanks Paul. Very well explained.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      Thanks for the feedback, Wireless. I’m glad you liked it.

    • @mdshoaug9019
      @mdshoaug9019 2 года назад

      @@PaulTurnerChannel van ons land en

    • @PaulTurnerChannel
      @PaulTurnerChannel  2 года назад

      @@mdshoaug9019 You have me stumped. Is that Dutch?

  • @RayAvijeet
    @RayAvijeet 4 года назад

    Q. What happens if the public-key received in the very first connect instance is another server’s ? Could the security of the intended server be compromised ? How would an intermediary server be able to hack in then ? Pls explain briefly if possible to make it crystal.

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      Thanks for your question, Avijeet.
      For starters, this attack assumes that the attacker is able to get the user's client to redirect them to their server (rogue-server) instead of the server they intended to connect to (good-server). This would most likely be done by manipulating ARP or DNS (which is not necessarily trivial).
      With that said, here are the steps:
      1. User1 enters "ssh user1@good-server" on their workstation to login to good-server.
      2. User1 is redirected to rogue-server (based on the ARP or DNS manipulation above).
      3. User1 is prompted by their ssh client to confirm the public key for "good-server" (though it is actually the public key for rogue-server). User1 doesn't double check to ensure that is the correct public key for good-server and responds "yes" to their client. The client stores that as the correct public key for good-server.
      4. rogue-server then prompts user1 for their password. User1 enters their password into their ssh client, which is then sent to rogue-server.
      5. While user1 is awaiting a response from rogue-server (thinking that it is actually good-server), rogue-server initiates an ssh connection to good-server (e.g., using a command like "ssh user1@good-server").
      6. good-server prompts rogue-server for the password for user1.
      7. rogue-server provides the password they received from user1 to good-server.
      8. good-server returns a prompt to rogue-server.
      9. rogue-server returns the prompt provided by good-server to user1.
      10. As user1 starts to enter commands, rogue server passes those commands to good-server and the responses provided by good-server verbatim (so that user1 doesn't know that rogue-server is actually in the middle).
      Hope this helps.

  • @zj4678
    @zj4678 4 года назад +1

    You may want to annotate the video. Windows 10 supports SSH client and server natively :)

  • @MidwestDIY
    @MidwestDIY 6 лет назад

    It looks like Windows 10 (as of January 2018) come with SSH as an optional feature in beta version

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад +1

      Thanks for the note, Arlan. Yes, it looks like Microsoft is finally embracing SSH (the Powershell team at Microsoft has been pushing for this for a while). It will be interesting to see how rapidly it gets adopted in enterprises. I may have to edit my video to change the "If it is not Windows..." message :-)
      Thanks again.

  • @kalyanhr
    @kalyanhr 5 лет назад

    very well explained!!

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад

      I’m glad it was helpful, Kalyan. Thanks for the feedback.

  • @shashivardhan6541
    @shashivardhan6541 3 года назад +1

    Thank you sir

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад

      Thank you, Shashi. I appreciate you taking the time to comment!

  • @deepakevgoogle
    @deepakevgoogle 6 лет назад

    Well explained. Thank you.

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Thank you for taking the time to comment, Deepak. I'm glad you liked it.

  • @juanjosecastro2178
    @juanjosecastro2178 6 лет назад

    Nice video. I use public/private keys in openvpn software. But i was wondering how it works on cisco or other network devices since the user who logs into it via ssh doesn't have a private key, he or she, only types the username/password.

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Sorry for the very slow response, Juan Jose. The default for SSH is to use a username and password. When a client connects and accepts the server's public key, the client and server are able to establish a secure connection via Diffie-Hellman (a cryptographic algorithm used by SSH to establish a session key between the client and server). The user is then able to enter their username and password and it is transferred safely across the encrypted connection. Most SSH systems provide the option to use SSH public key authentication, where an authorized key is placed on the server, as described in this video. I hope this helps.

  • @gissc-globalitsecuritysolu2163
    @gissc-globalitsecuritysolu2163 6 лет назад

    Very good overview..

  • @liliacfury
    @liliacfury 4 года назад

    What’s the purpose of the servers having their own private key? (The orange and blue, not the green.) Now, I understand the purpose of the administrator having a private key, it is needed to initiate the process of the server authenticating that said administrator can be trusted, but why does the server need a private key? The server asks us if we trust it, so does the private key give an extra warning that we can trust it (without it it would give us an extra warning that we can’t trust it?), and it’s just double checking with us (via a prompt using the server’s public key) to make sure that we do trust it?
    Also, just to clarify, are all of these SSH keys? And similar to public keys from servers needing to be manually verified by the administrator (via prompt), do the servers need to have the administrator manually place their user keys (grey) onto the servers’ authorized keys file? Or is it automated when the server identifies that the user owns a private key?

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      These are great questions.
      #1 - Purpose of Server Private Key: The server authenticates that they are the holder of the public key by signing something for the client with their (the server's) private key (the server public and private keys are mathematically/cryptographically related so that this can be done). Let's say that the client has Server1's public key from a previous connection and later connects to an attacker's server attempting to act as Server1. Since the attacker's server doesn't have the private key that matches Server1 public key, it can't provide a valid digital signature (signing something unique to the session) during the SSH session establishment. Consequently, the client will throw an error and not continue with the connection.
      #2 - Are these all SSH keys: Yes. All of the keys described in the presentation are SSH keys. And, as you say, the server looks for user public keys placed in authorized_keys files. It uses these public keys to validate that the clients have the corresponding private keys in their possession (using digital signatures as described in the first paragraph above but in the opposite direction, client to server). You also ask about who places the public keys. First, yes, unique client public keys must be explicitly placed in each user's .ssh/authorized_keys file (each matching the private key that the user holds). How these keys get place in the authorized_keys files depends on the policy of the organization. They can be: 1) installed by each user (which is not a recommended practice and should be prevented through configuration), 2) installed by the administrator can manually place them, or 3) they can use an automated system to provision and manage the user public keys.
      I hope this helps. Please don't hesitate to ask for further clarification if anything didn't make sense.

  • @bigo025
    @bigo025 6 лет назад

    Can somebody tell me why did he create a new key pair on server 2 to communicate with server 1, instead of using the old key pair ?
    Thank you

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад +1

      Thanks for the question, Kmer. My understanding of your question is you're wondering why the User Keys labeled "A" above Alice are not also used for the User Keys labeled "2" above Server2. The reason is that the User Keys labeled "A" are used by Alice for her access. The User Keys labeled "2" are used by an automated application on Server2 to access Server1. I realize now that is a little confusing. You might want to watch my other video on the Major Components of SSH (ruclips.net/video/PXi-39elr6Y/видео.html), which may provide a better explanation. The basic rule is that every entity (whether User or Automated Process) should have its own user keys. Alice has a User Key labeled "A" to access Server1 and Server2. The automated process on Server2 has a different User Key labeled "2" to access Server1. I hope that makes sense.

    • @bigo025
      @bigo025 6 лет назад

      Paul Turner it is everything clear now thank you.

    • @arisgreek8697
      @arisgreek8697 5 лет назад

      @@PaulTurnerChannel what i do not understand is why should server2 create a new key pair for its interaction with server1?
      I would expect each entity (laptop,pc,server etc) to create only one asymmetric keys pair for all its ssh (whether it will be a client or a server) interactions.

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад +1

      @@arisgreek8697 This is a very good question. It is possible to use the host key, used when acting as a server, for client authentication with other systems (acting as servers). That mode is called host-based authentication mode. Generally, it is not recommended.
      As background, there can be multiple accounts (users and apps) on a system that are able to use SSH. When you configure a system to use host-based authentication, it makes it more difficult to determine which account performed operations. In general, you want to make sure you can clearly see what operations have been performed by each account on a system (since each account has unique credentials and you want to be able to identify who might have done something wrong, etc.).
      The following paper has a bit more information on this: nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf.
      I hope this helps. Please tell me if I didn't answer your question clearly.

  • @amula5939
    @amula5939 6 лет назад

    can server2 use its Server keys to communicate with server1 instead of User keys?

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Sorry for the slow response, Amanuel. You can use host-based authentication to authenticate clients (users or automated processes authenticating to another system that is acting as an SSH server). This is not really a recommended method of authentication, as you can't configure command restrictions and there are other limitations. There is a bit more explanation in nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf if you're interested.

  • @IsmailMohammedi4ismail
    @IsmailMohammedi4ismail 7 лет назад

    great video ! :-)

  • @Manch271
    @Manch271 Год назад

    Thanks.

  • @alexperez85
    @alexperez85 6 лет назад

    awesome stuff

    • @alexperez85
      @alexperez85 6 лет назад

      any part 2?

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Hey, Alex. Sorry for the slow response. The best I have so far for Part 2 are:
      ruclips.net/video/JKrO5WABdoY/видео.html
      ruclips.net/video/PXi-39elr6Y/видео.html
      ruclips.net/video/dr8W34hautc/видео.html
      I'm hoping to get some other material done but this darn day job keeps getting in the way :-)
      Thanks a lot for the feedback!

  • @researches_technical_stuff7392
    @researches_technical_stuff7392 6 лет назад

    TLS is Transport Layer SECURITY, not Transport Layer Services.

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Doh! Good catch. I can't believe I included in the video.

    • @researches_technical_stuff7392
      @researches_technical_stuff7392 6 лет назад

      This is still a superior explanation of the topic, and a good resource. Engineers misspell, misspeak, and flub terminology while still being competent. Thanks for the good work

  • @AbuSaud.Christos
    @AbuSaud.Christos 7 лет назад

    what are keys ? :D

    • @PaulTurnerChannel
      @PaulTurnerChannel  7 лет назад

      Thankks for your comment and question, Mahmmad. I have another video that provides a basic introduction to algorithms, keys, and certificates at ruclips.net/video/q9vu6_2r0o4/видео.html. Not sure if this is what you were looking for. Thanks again.

  • @engalipak
    @engalipak 3 года назад

    I maybe the odd one out here. But the keys explanation didn't make any sense to know how they work step by step.

    • @PaulTurnerChannel
      @PaulTurnerChannel  3 года назад

      Hi, Ali. I’ve created another video (ruclips.net/video/PXi-39elr6Y/видео.html) that provides a slightly different explanation. If that is not helpful, what were you looking to understand that is not covered?

  • @Hairregrowthjourney
    @Hairregrowthjourney 6 лет назад

    I can't hear ya

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад +1

      :-). Thanks, Saurabh. This was one of my very first videos, before I understood the importance of a good microphone. Sorry about the poor audio quality. Thanks again.

  • @PepeAlwaysLoses1
    @PepeAlwaysLoses1 7 лет назад +2

    WHAT, I CANT HEAR THEM, WHAT ARE THEY SELLING?!

    • @PaulTurnerChannel
      @PaulTurnerChannel  7 лет назад +2

      Timothy, I don't understand your comment. Did you have trouble hearing the audio? Also, did you get the impression I was trying to sell something?

    • @PepeAlwaysLoses1
      @PepeAlwaysLoses1 7 лет назад +2

      Yes. I was satirizing the low audio in the video.
      It is an internet meme.
      Thanks for having me explain it.

  • @luacode.x1249
    @luacode.x1249 6 лет назад

    It's a joke, right? Only 446 subscribers? This is as unfair as, lets say, Jesus scarifying himself in solitude and being forgotten by men or history. People are stupid. SSH IS GREAT! And wait, did I write 446? I meant 447, mb ;)

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад

      Thanks for your comment, Lua, and for subscribing. It is safe to say that Jesus is in a completely different league :-)

  • @sdfasdfsdfklsdfjklsdflsdkl377
    @sdfasdfsdfklsdfjklsdflsdkl377 6 лет назад

    your video takes 13:37 minutes :p

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад +1

      Yes, it is quite long. I have a problem communicating concepts in a succinct manner. Still working on that. Thanks.

  • @NadeemInamdar
    @NadeemInamdar 5 лет назад +1

    Good video. But the voice of the narrator is feeble.

    • @PaulTurnerChannel
      @PaulTurnerChannel  5 лет назад +1

      Nadeem, when I read your comment this morning, it caused me to break out laughing out loud. I haven’t been called feeble too often. I apologize for the poor audio. I recorded that video before I understood the importance of a good microphone, though I may still sound feeble in some of my other videos as well. At any rate, I appreciate you taking the time to comment and give me a good laugh (I didn’t take your comment as a slight). I wish you all the best. Thank you.

  • @junjecguatno8584
    @junjecguatno8584 6 лет назад

    come on dont be shy turn yo voice up for god sake

    • @PaulTurnerChannel
      @PaulTurnerChannel  6 лет назад +1

      Sorry, Honhek. This was one of my first videos, before I understood the importance of a good mic. I got a better mic a little later so my other videos hopefully have clearer audio. Thanks for watching and enduring the poor audio.

    • @junjecguatno8584
      @junjecguatno8584 6 лет назад

      all good man, keep up the good work. cheers

  • @aathithrajendran6463
    @aathithrajendran6463 4 года назад

    audio sucks

    • @PaulTurnerChannel
      @PaulTurnerChannel  4 года назад

      Thanks for taking the time to provide feedback. This was one of my first videos, before I understood the importance of a good mic. Sorry that the audio is not good in the video.