SSH
Table of Contents
Topics
How SSH works
Establishes a session key with Diffie-Hellman algorithm
- Used to encrypt the entire session

Authenticates the User's Access

- This process is mostly by RSA algorithm
- (me)d≡ m (mod n)
- (md)e≡ m (mod n)
Public keyconsists of(e, n)Private keyconsists of(d, n)- Finding
dfromeandnis hard estands forpublic exponent, and OpenSSL sets it as65537(0x10001) by default
Fingerprints
If the fingerprint changes:
- The machine has changed their public key (because
public exponentcan vary, there can be multiple valid public keys). - It could also indicate that you are connecting to a different machine at the same domain/IP
- It could also indicate that you are being targeted with a man-in-the-middle attack