How SSH key Works ?

Поделиться
HTML-код
  • Опубликовано: 29 июл 2024
  • What is SSH key pair? Why we need SSH key? How SSH key works? Authentication via ssh key pair.
    Generate and Use SSH key : goo.gl/hK9h54
    Become My Patron here goo.gl/NcvDQh
    You can donate any amount via Paypal follow this link goo.gl/JhWsKC
    ==============================================
    Deploy Laravel on Digital Ocean Full series:
    1. Log Into Server via SSH ?
    • Deploy Laravel on Digi...
    2. High Server Security
    • Deploy Laravel on Digi...
    3. Install LEMP stack on Ubuntu server
    • Deploy Laravel on Digi...
    4. Install Laravel via Github on server
    • Deploy Laravel on Digi...
    ==============================================
    Join Our Slack Community - goo.gl/pqCjZH
    --You May Also Like --
    Real Time Chat Series - goo.gl/ri42FD
    Git ans Github series - goo.gl/BXyPxf
    Blog with Admin panel Series - goo.gl/S5JGyt
    Laravel Authentication Series: Multi Auth - goo.gl/TyCLlX
    Vue Beginner To advanced Series - goo.gl/1bjdGg
    Sublime Text Best Package Series - goo.gl/6phTPP
    Laravel Ajax Todo Project - goo.gl/p2xTPW
    Laravel 5.4 Full Beginner Playlist - goo.gl/zpKzhM
    Laravel 5.3 Hindi Beginner Tutorials - goo.gl/Kb3ikd
    Full Playlist for the "Laravel 5.3 Hindi Beginner Tutorials" Series: • Laravel 5.3 Hindi Begi...
    ==================FOLLOW ME ==================
    Subscribe for New Releases!
    Twitter - / bitfumes
    Facebook - / bitfumes
    Instagram - / bitfumes
    (ask me questions!)
    -- QUESTIONS? --
    Leave a comment below and I or someone else can help you.
    For quick questions you may also want to ask me on Twitter, I respond almost immediately.
    Email me support@bitfumes.com
    Thanks for all your support!
    LARAVEL 5.4 Tutorial | Cara Instal LARAVEL 5,4 dari awal Part 1 | Bitfumes
    Laravel 5.4 Tutorial | Come installare laravel 5,4 da zero Parte 1 | Bitfumes
    ~-~~-~~~-~~-~
    Please watch: "Laravel 5.4 Tutorial | Email From Server (Godaddy) #3 | Part 26 | Bitfumes"
    • Laravel 5.4 Tutorial |...
    ~-~~-~~~-~~-~
    que es api
    ما هو أبي
    o que é api

Комментарии • 176

  • @danielbaharestani8197
    @danielbaharestani8197 4 года назад +63

    The client doesn't send the secret back to the server, because the secret could be stollen this way. It uses the secret to encrypt the rest of the communication.

    • @danielbaharestani8197
      @danielbaharestani8197 4 года назад +7

      ​@@NetworkInfo No verification is needed because the rest of the communication will be encrypted. If the client was not able to get access to the key, it wouldn't be able to continue the communication. The fact that client can now send encrypted messages to server and the server can decrypt them proves that the client was legit hence able to get access to the secret key.

    • @rakeshshiva625
      @rakeshshiva625 4 года назад

      There is only one secret key. So is it symmetric encryption.

    • @perminusgaita
      @perminusgaita 4 года назад +1

      so the server sends back its public key so that the client can encrypt the rest of the data is sends?

    • @dnilbhr
      @dnilbhr 4 года назад +2

      @@rakeshshiva625 there are two, the server's public key will be used by client to encrypt the message and the server's private key will be used by the server to decrypt them, so asymmetric.

    • @dnilbhr
      @dnilbhr 4 года назад +1

      @@perminusgaita correct

  • @braindeveloperdimensional5579
    @braindeveloperdimensional5579 6 лет назад +10

    great explanation!
    Your video provided the most important fragments of information which other videos lack,
    for ex:- you mentioned the key being a cipher and you explained which software are used in these different OSes.
    Thanks And
    Keep up the good work!

    • @Bitfumes
      @Bitfumes  6 лет назад

      Thanks for watching bro, please like BitFumes on facebook to get latest updates.

  • @duladuda9891
    @duladuda9891 4 года назад

    Lovely video still valid in 2020. Shame most techies fail to explain this in a simple way as you have done thanks.

  • @Itisbane
    @Itisbane 5 лет назад +2

    Great and simple explanations! Thank you.

  • @FredericoButzke
    @FredericoButzke 6 лет назад +1

    Good lesson. You explained it very well. Thank you!

  • @mohamedsahil5132
    @mohamedsahil5132 5 лет назад +6

    How client share that top secret key with server ?
    It might get change during sharing and server will never verify that user

  • @adamyoussef6880
    @adamyoussef6880 5 лет назад +1

    Thanks, great video! It helped me to get the idea of SSH.

  • @bembem3063
    @bembem3063 4 года назад

    If I have just a LapTop and want to use a SSH just for security can I just Enable the Open ssh on my LapTop. Or do I have to have a server to configure the ssh? I just can't get it right.

  • @erdenebilegb.379
    @erdenebilegb.379 4 года назад

    The best explanation I have come across! Thanks :')

  • @mahmutaydn4378
    @mahmutaydn4378 7 месяцев назад

    thank your for explanation.however, client send topsecret key without hashing? what happens if somebody gets this open topsecret key during sending client to server?

  • @feruzaabrham2365
    @feruzaabrham2365 4 года назад

    is host based authentication and secure shell are the same?

  • @be-kreidly1515
    @be-kreidly1515 Год назад

    amazing explanation! 2 times better than the universities when they explain it. More videos like this please

  • @MegaPruddy
    @MegaPruddy 5 лет назад +2

    Thank you for a wonderful explanation. Bless your heart...

    • @Bitfumes
      @Bitfumes  5 лет назад

      Thanks for watching, please like BItfumes on facebook/twitter to get latest updates.

  • @sandhyab9577
    @sandhyab9577 5 лет назад

    Great explanation..thank you!!

  • @acerlmt
    @acerlmt 5 лет назад

    But what if mitm send back compromised data, encrypted with your public key? Is this possible? And then get your password of server and other info.

  • @ophelia6207
    @ophelia6207 4 года назад

    This is great, you're explaining in such a good way!! Thanks a lot

    • @Bitfumes
      @Bitfumes  4 года назад

      Glad it was helpful!

  • @SHANUSHAH
    @SHANUSHAH 6 лет назад +1

    You opened my eyes to SSH , great explanation

    • @Bitfumes
      @Bitfumes  6 лет назад

      Thanks for watching, please like BItfumes on facebook to get latest updates.

  • @carlavirhuez4785
    @carlavirhuez4785 4 года назад

    Best video about SSH keys. Thanks a lot!!

  • @WizardImon
    @WizardImon 4 года назад

    Excellent Specking and Explaining Style. Keep it up brother

  • @saurabhmaheshwari6430
    @saurabhmaheshwari6430 5 лет назад +1

    Nicely explained.Thanks!!

  • @dadduchandak4337
    @dadduchandak4337 5 лет назад +1

    How server generate the SSH certificate in Linux?? Pls reply ASAP

  • @SriRam-iu1rz
    @SriRam-iu1rz Год назад

    you say that the service is only available when the system starts , is it possible for a admin to use Wake-On-LAN in a Client system while the system in in off and establish the tunnel

  • @asmatarunnum3071
    @asmatarunnum3071 4 года назад

    Wow how simple u made it ........ simply awesome Plz make Somme more videos of this kind

  • @VikasChauhan1809
    @VikasChauhan1809 4 года назад

    seriously man
    you made it so easy
    thanks 👌👌

  • @khandakertoihid2100
    @khandakertoihid2100 3 года назад

    Thanks for clear view in easy way! 😊

  • @MrDragoon73
    @MrDragoon73 4 года назад +1

    Great video!!! explaining in a simple way a difficult subject

    • @Bitfumes
      @Bitfumes  4 года назад

      Thanks for your love and support, keep learning. Follow bitfumes on twitter.com/bitfumes or facebook.com/Bitfumes to get the latest updates.
      bitfumes.com

  • @ignaspan
    @ignaspan 4 года назад

    How does client encrypt data locked with public key, by using the private key?

  • @RaoulsRandomVideos
    @RaoulsRandomVideos 5 лет назад +2

    Thanks a lot. This is exactly the information I was looking for. Most videos assume I already know what a public and private key is so thanks for clearing everything from the ground up.

  • @MrRIIISEN
    @MrRIIISEN 4 года назад

    Thanks for this. Very helpful.

  • @divyanshchandelcse1618
    @divyanshchandelcse1618 Год назад

    Thankyou for great explaination

  • @CoolBishop1997
    @CoolBishop1997 4 года назад

    thank you for the very clear tuto

  • @EncikHoovy
    @EncikHoovy 4 года назад

    Tq bro, you really explained it in a clear way and easy to understand . Tqtq so much

  • @hpandeymail
    @hpandeymail 4 года назад +2

    Thanks for the details.. one query how does it know the first time which public key to pick for a new request .. what is that id against which the public key is picked for the authentication purpose

    • @thespai4227
      @thespai4227 2 года назад

      I have the same question, did you finally get the answer?

  • @sandeepgupta1724
    @sandeepgupta1724 2 года назад

    you have explained it very well. Thanks a lot.

  • @toriolaakinyele6023
    @toriolaakinyele6023 4 года назад

    Many thanks for the summarized explanation!

    • @Bitfumes
      @Bitfumes  4 года назад

      Glad it was helpful!

  • @exlr8in
    @exlr8in 3 года назад

    Correct me if I am wrong please? The step that I always missed understood was section 4:36....
    1. A public key is created by the client
    2. And some how this newly created client public key is provided to the server to keep
    3. Then when the client ssh(s) into the server, it sends the public key it has while connecting
    4. The server receives the connection request "and" compares the public key being received with the once the server has on a list
    5. If the keys match, then the server sends "its own" public key back the client
    6. The client accepts the servers public key and connection is made
    If the process describe above is correct, then this means that servers have to have a way of accepting (someone approves) public keys from clients (step number 2 above) so that it compares when being used?

  • @kso35
    @kso35 3 года назад

    This was great!!! Thank you!!!

  • @bhupeshbhuraria5060
    @bhupeshbhuraria5060 2 года назад

    Very well explained

  • @lerubikscubetherubikscube2813
    @lerubikscubetherubikscube2813 6 лет назад

    Just what I needed, thanks! :D

    • @Bitfumes
      @Bitfumes  6 лет назад

      Thanks for watching bro, please like Bitfumes on facebook to get latest updates,

  • @adrianavargova
    @adrianavargova 5 лет назад

    Thank you, it's a bit clearer now.

    • @Bitfumes
      @Bitfumes  5 лет назад

      thanks for watching, please check bitfumes.com/courses for more advanced courses

  • @riskyfauziah570
    @riskyfauziah570 3 года назад

    Thanks a lot :)
    this video help me to understand how SSH works :)

  • @bzaruk
    @bzaruk 5 лет назад

    Awesome explanation!!!

  • @bzaruk
    @bzaruk 5 лет назад

    @Bitfumes Webnologies
    Great explanation!
    But I have a question, if I am a MITM, I can catch the encrypted "top secret" message from the server (in this state I cannot read the message or get the private key) - but when I am able to catch the decrypted "top secret" that the client send back to the server, I now have the encrypted "top secret" message and the decrypted "top secret" message, and now I can figure out the private key... am I wrong? there is something I miss here?

    • @_sayone_
      @_sayone_ 11 месяцев назад

      encryption algorithm which is used in SSH is RSA and it is really hard to guess it, the key itself could be AES-256 encrypted, so it will take few million years to guess

  • @PouyaAtaei
    @PouyaAtaei 2 года назад

    great video, thanks.

  • @RezhwScene
    @RezhwScene 3 года назад

    What a great explanation! Thank you!

    • @Bitfumes
      @Bitfumes  3 года назад

      You're very welcome!

  • @granand
    @granand 5 лет назад

    I am lost here, Okay remote computer uses public key to encrypt a secret key which is a key to SSH. Well public key is known and so what's the point ...I am lost, please help

  • @Darklaki1
    @Darklaki1 4 года назад

    thank you very much sir

  • @paragkotekar1763
    @paragkotekar1763 3 года назад

    Very well described. and good use of real time IMAGEs.
    Only a genius can think of such details.
    Thanks

    • @Bitfumes
      @Bitfumes  3 года назад

      Glad you liked it

  • @marcinkaliszewski2326
    @marcinkaliszewski2326 Год назад

    Great explanation! Thx :-)

  • @arqumanwaar.6244
    @arqumanwaar.6244 4 года назад

    Great video... Excellent work

  • @sahanam705
    @sahanam705 Год назад

    Well explained

  • @abhinavkumar-se2fd
    @abhinavkumar-se2fd 3 года назад

    Great explanation...... I have a question. When I am already on a linux machine and from there if I want to ssh any other linux machine then I do "ssh -i key.pem ". Here key.pem is private key. In this case how handshake happen as I am not sending Public key ?

  • @ashutoshchauhan4928
    @ashutoshchauhan4928 5 лет назад +2

    Private key can't be shared and private key can only decrypt the data
    So once, the secure tunnel is established,
    Does the data sent from client is encrypted using public key?
    If yes then, how can server decrypt the data, as it does not have the private key of client??

    • @charismaticaazim
      @charismaticaazim 5 лет назад

      Data is encrypted using the public key. The secret key shared is encrypted using the clients public key, which can only be decrypted using the clients private key

  • @zubairwali222
    @zubairwali222 4 года назад

    Nice explanation

  • @zael7848
    @zael7848 3 года назад

    Very clear explanation, thanks!

    • @Bitfumes
      @Bitfumes  3 года назад +1

      Thanks for your love and support, keep learning. Subscribe to bitfumes newsletters
      bitfumes.com/newsletters

  • @leonbecker6140
    @leonbecker6140 4 года назад

    Great explanation. 👍

  • @prasannakumar1625
    @prasannakumar1625 2 года назад

    Thanku easy to understand terminology

  • @nishankbani3257
    @nishankbani3257 6 лет назад

    Clear explanation. Thanks.

    • @Bitfumes
      @Bitfumes  6 лет назад

      Thanks bro for watching, keep learning.

  • @hassibabdouli2578
    @hassibabdouli2578 6 лет назад

    Thanks for the good explanation

    • @Bitfumes
      @Bitfumes  6 лет назад

      Thanks for watching bro, keep learning. Please like Bitfumes on facebook to get latest updates.

  • @rameshrudra2387
    @rameshrudra2387 4 года назад

    Simple and concise

  • @mednagurero3550
    @mednagurero3550 2 года назад

    thank you

  • @kuqezi294
    @kuqezi294 4 года назад +1

    This video is not completely correct ! There is an missing part with the Diffie-Hellmann for the symmetric key wich is used to encrypt the communication. The asymmetric keys are only used for authentication.

  • @subhasissahu9142
    @subhasissahu9142 4 года назад

    Would you make a video highlighting difference between the working of SSH and SSL

  • @bama2619
    @bama2619 2 года назад

    Clear explanation! Thank you! Please, make examples!))

  • @venkateshthirunagiri85
    @venkateshthirunagiri85 4 года назад

    Excellent Explination bro
    Great 🙏

    • @Bitfumes
      @Bitfumes  4 года назад

      Thanks for watching bro, keep learning.
      For full course checkout bitfumes.com

  • @dnilbhr
    @dnilbhr 4 года назад +1

    What if the decrepted top secret is stolen while being sent back to the server?

  • @sandeepbansal9555
    @sandeepbansal9555 2 года назад +1

    Amazing explanation! :)

    • @Bitfumes
      @Bitfumes  2 года назад

      Thanks for your love and support, keep learning. Follow bitfumes on twitter.com/bitfumes or facebook.com/Bitfumes to get the latest updates.
      bitfumes.com

  • @tapassamui7886
    @tapassamui7886 4 года назад

    If I use password authentication for ssh session then how the data gets encrypted? In password authentication the client's public key is not present in server.

    • @tapassamui7886
      @tapassamui7886 4 года назад

      @@NetworkInfo I believe ssh channel is first established then authentication process starts. Ssh server and client first set up a secret key using Diffie Hellman algorithm and then that key is used to encrypt the channel. Next it asked for authentication method, either password based or ssh key based. That's why ssh key is not necessary for ssh connection. And we will always share client key into server, generating public private key is not necessary in server. For SSL it's different where server's public key is shared with client.

  • @Spacetime23
    @Spacetime23 7 месяцев назад

    4 videos dekhne ke baad... ab jaake kuch samajh main aaya ...!!! this video gave me a clear picture.... Maybe I have a low IQ..

  • @Nabilliban14
    @Nabilliban14 5 лет назад +4

    When sending the Top Secret Key back to the server, can't someone intercept it and send it over to the server before you get yours to the server, thus not verifying the correct user?

    • @Vaaaaadim
      @Vaaaaadim 4 года назад

      Old comment but,
      I think that would be correct. But at that point I don't think any protocol can help you. It is very well the case in practice that services can be denied e.g. DDOS(not that that is the scenario you describe). The point of having such protocols is not to guarantee that the sender and receiver can communicate, but instead that when communication occurs, an interceptor would not be able to extract any useful information.
      Even without some malicious actor, we can't guarantee that communication works out. Sometimes packets of data just drop ruclips.net/video/7rLROSYcQU8/видео.html. You can't even guarantee that two computers are absolutely sure that they both agree on something (The Two Generals Problem) ruclips.net/video/IP-rGJKSZ3s/видео.html
      A single computer can't even have guarantees about it's current state, like stray cosmic rays can hit the silicon to flip bits.
      Anyways, though we have a lot of things we can't guarantee, one can attempt to produce the most robust solution possible given the circumstances(and, with some assumptions, prove that it is secure), or we can produce a solution which we believe to have a low probability of failing. Like, it is incredibly unlikely that cosmic rays do flip bits in memory, but even if this was an issue there are ways of using redundancy to lower the probability that we read corrupted data(coding theory and information theory). Quicksort is an example of an algorithm where we choose to take our chances, it hinges on selecting a random pivot, and on average it is a very fast algorithm but if you give it a really inconvenient input list it will have the same time complexity as the naive sorting algorithms(Bubblesort, SelectionSort, etc).
      To put out one last caveat, we don't even know if cryptography is actually bulletproof :)
      It's still an open question as to whether P = NP, but if it is and we find a good algorithm for
      solving NP problems, then we also have a good algorithm for breaking cryptography.
      Noone's cracked P vs NP yet though, and modern cryptography isn't cracked yet either(or maybe it is and some people have kept that secret really well), soooooooooooooooooooooooooooooooooo it's probably safe.
      Rant aside, SSH and all other protocols can't guarantee service, but if it is observed that the service is consistently being denied and it's an issue, then either the user or the people who provide the service should investigate and figure out what the root cause is.

    • @yordanibonilla5859
      @yordanibonilla5859 4 года назад +2

      Server gets your public key
      Server encrypts a [challenge] with your public key
      You decrypt the challenge with your private key(as only your private key will unlock what the private key you shared locked) and send back the challenge
      Server verified the challenge and established a tunnel

    • @Vaaaaadim
      @Vaaaaadim 4 года назад

      @@yordanibonilla5859 I see, but the question Nabil asks still applies. Basically the situation would become, what if an interceptor responds to the challenge before you do(with an invalid response), resulting in the challenge being failed and you not being verified.
      Ah, but upon rereading the original comment, it says "not verifying the correct user". I interpreted it as the interceptor preventing you from being verified, rather then the interceptor being verified pretending to be you. But ya, given this procedure they can't beat the challenge the server provides.

    • @yordanibonilla5859
      @yordanibonilla5859 4 года назад

      @@Vaaaaadim Right and if they the interceptor did send the correct challenge by intercepting yours and it so happens to get there before you wouldn't they just be doing you a favor verifying ya lol?

    • @Vaaaaadim
      @Vaaaaadim 4 года назад +1

      @@yordanibonilla5859 Oh, right, duh. It wouldn't help them to beat the challenge on your behalf.

  • @gsganguli
    @gsganguli 6 лет назад +1

    Good explanation

    • @Bitfumes
      @Bitfumes  6 лет назад

      Thanks for watching bro, please like Bitfumes on facebook/twitter to get latest updates.

  • @pritimadhukumar5121
    @pritimadhukumar5121 5 лет назад

    Sweet and short.. Well done

    • @Bitfumes
      @Bitfumes  5 лет назад

      thanks for watching, please check bitfumes.com/courses for more advanced courses

  • @akashbidap
    @akashbidap 2 года назад

    Nice video very helpful

  • @rajasekharbonthala
    @rajasekharbonthala 6 лет назад +4

    In the video it is mentioned that at last the secret is sent back to server so server can identify the client. This secret can hacked. How it is avoided. Adding that to the video would make it complete.

    • @wimrotor
      @wimrotor 5 лет назад +1

      Is the client going to encrypt this secret with the public key provided by the server?

    • @juanjosecastro2178
      @juanjosecastro2178 4 года назад

      @@wimrotor i have the same exact doubt.. when the client send back the callenge to the server, the client encrypts that challenge into de pub key ???

  • @pandeykailashify
    @pandeykailashify 5 лет назад

    Very good presentation

    • @Bitfumes
      @Bitfumes  5 лет назад

      Thanks for watching, please like Bitfumes on facebook/twitter for more updates.

  • @SuperJosba
    @SuperJosba 2 года назад

    It’s symmetric encryption but the key is transmitted via asymmetrical encryption

  • @kennyjohnsen5161
    @kennyjohnsen5161 5 лет назад

    Does SSH helps to Prevents websites from seeing the computer IP Address?

    • @Bitfumes
      @Bitfumes  5 лет назад

      nope, it is just an authorization mechanism to access system data from remove system

  • @fozilkholboev5291
    @fozilkholboev5291 3 года назад

    wow great can you tell me difference between Bash language and puTTY and Command line command prompt. also what connection is there between Bash and Linux.
    Thanks in advance

  • @nabeelyousafpasha
    @nabeelyousafpasha 3 года назад

    Thanks 🙏 and Respect from Pakistan 🇵🇰

  • @the-moocow
    @the-moocow 3 года назад

    Good video

  • @IboKnowsBest
    @IboKnowsBest 4 года назад

    nice video :-)
    thanks.

  • @laso9593
    @laso9593 11 месяцев назад

    Can I get this ppt?

  • @seek12341
    @seek12341 5 лет назад

    Clear explanatoin...

  • @All_and_normal
    @All_and_normal 2 года назад

    Nice

  • @mindstrenght2592
    @mindstrenght2592 4 года назад

    Can you please explain how to use SSH on android smartphone

  • @OmGSoaM
    @OmGSoaM 5 лет назад +2

    Update: Windows 10: PowerShell got a ssh-client plugin! Same syntax like Linux

  • @prakashsubramanian4671
    @prakashsubramanian4671 4 года назад

    Thankyou friend

    • @Bitfumes
      @Bitfumes  4 года назад

      Thanks for your love and support, keep learning.
      Follow bitfumes on twitter.com/bitfumes or facebook.com/Bitfumes to get the latest updates.

  • @shreyasrivastava7712
    @shreyasrivastava7712 5 лет назад +1

    Thanku sir

    • @Bitfumes
      @Bitfumes  5 лет назад

      Thanks for watching, Please subscribe to bitfumes' course section. bitfumes.com/courses

  • @arunj343
    @arunj343 4 года назад

    nice

  • @RAVIKUMAR-ef4wo
    @RAVIKUMAR-ef4wo 5 лет назад

    awesome

  • @latertheidiot
    @latertheidiot 3 года назад

    Well the animations are cool but how does the server know your private key so that you can decrypt with your private key

    • @Bitfumes
      @Bitfumes  3 года назад

      you need to put the private key manually or automatically

    • @latertheidiot
      @latertheidiot 3 года назад

      @@Bitfumes I searched more about this and found out that the pair of the public and private key are some how mathematically connected, but there is no way to derive one key from another. Whatever is encrypted by public key can only be decrypted by the paired private key.

  • @raghavendrac7773
    @raghavendrac7773 5 лет назад

    Sir, its nice presentation with little diversion!. you said, "Symmetrical encryption can’t be done on remote servers". But you didn't continue the need for SSH with proper justification.

    • @robdoubletrouble
      @robdoubletrouble 4 года назад

      it is the same key everywhere - hence, sharing it becomes increasingly risky
      with asymmetrical encryption, identity and uniqueness is assigned to a caller

  • @MrLittle0inker
    @MrLittle0inker 6 лет назад

    :D Man, I just can't get over the phonetic. Anyway, I like it in a different wa! y!

    • @Bitfumes
      @Bitfumes  6 лет назад

      THanks for watching bro, please like Bitfumes on facebook to get latest updates.

  • @talkingbiscuit4787
    @talkingbiscuit4787 Год назад

    the legendary indian programmer

  • @ErikDaGreat
    @ErikDaGreat 6 лет назад

    when did u get private key?

  • @N00BRIUM
    @N00BRIUM 6 лет назад +6

    Server gets your public key
    Server encrypts a challenge with your public key
    You decrypt the challenge with your private key and send back the challenge
    Server verified the challenge and established a tunnel

    • @manojprajapati932
      @manojprajapati932 5 лет назад +1

      After connection established we go to folder .ssh(of server) and copy all private keys( which will be encrypted by client public key) and get it into our system 😂 finally we hacked it.

    • @chintaraghu7060
      @chintaraghu7060 5 лет назад

      @@manojprajapati932 lol

    • @alfonsiuspietra7769
      @alfonsiuspietra7769 4 года назад

      You decrypt the challenge with your private key and send back the challenge
      how?
      user only have public key, only the server have private key

  • @yihou6433
    @yihou6433 2 года назад

    The "SSH Working" part gives a wrong explanation. The SSH public key authentication is signature-based challenge response protocol, which can be found in SSH protocol on section 7. The public key encryption and public signature are totally two different things.

    • @huijunxie3460
      @huijunxie3460 2 года назад

      I agree. In general the RUclips video gives a very nice illustration on how SSH keys works. however, I don't agree with the top secret explanation. The "top secret" is a "challenge" generated by server to prove client has a proof of possession of the private key. Once decrypted, client signs the clear text version of the top secret with its private key and sends back to server. Server uses client's public key to authenticate the top secret by verifying the signature. Once the verification is successful, the security channel is established.

  • @ashish4165
    @ashish4165 5 лет назад +7

    change the title == symmetric and asymmentric key.....

  • @vanthuanluong9398
    @vanthuanluong9398 3 года назад

    what if hacker catch that Top secret key and send it to the server himself?