{"id":2184,"date":"2022-02-25T06:14:13","date_gmt":"2022-02-25T06:14:13","guid":{"rendered":"https:\/\/blog.samarthya.me\/wps\/?p=2184"},"modified":"2022-02-25T06:16:48","modified_gmt":"2022-02-25T06:16:48","slug":"ssh-protocol","status":"publish","type":"post","link":"https:\/\/blog.samarthya.me\/wps\/2022\/02\/25\/ssh-protocol\/","title":{"rendered":"SSH Protocol"},"content":{"rendered":"\n<div class=\"wp-block-snow-monkey-blocks-box smb-box\"><div class=\"smb-box__background\" style=\"border-width:1px;opacity:1\"><\/div><div class=\"smb-box__body is-layout-constrained wp-block-snow-monkey-blocks-box-is-layout-constrained\">\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg\" alt=\"\" class=\"wp-image-1897\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg 150w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150@2x.jpg 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><div class=\"smb-balloon__name\">Me<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#f78da7;border-color:#f78da7\"><p>What is SSH protocol?<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>It is also referred to as Secure Shell, is a method for secure remote login from one computer to another. It is an alternative to <code>telnet<\/code> and <code>rlogin<\/code><\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>\u00a0It protects the communications security and integrity with strong encryption.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg\" alt=\"\" class=\"wp-image-1897\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg 150w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150@2x.jpg 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><div class=\"smb-balloon__name\">Me<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#f78da7;border-color:#f78da7\"><p>How does it work?<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>&#8211; It works in client server model. <\/p><p>&#8211; The SSH client drives the connection setup and uses <code>public key cryptography<\/code> to verify the identity of the SSH server.\u00a0<\/p><p>&#8211; Once a connection is established data that is transmitted is encrypted according to the parameters negotiated in the setup.\u00a0<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>After the setup phase is done, SSH protocol uses <strong>strong symmetric encryption<\/strong> and <strong>hashing algorithms<\/strong> to ensure the privacy and integrity of the data that is exchanged.<\/p><p>RFC &#8211; <a href=\"https:\/\/assets.ctfassets.net\/0lvk5dbamxpi\/7wNRdbPyeUDql7sZjv3ZTp\/ef86cf604b532728ee8da263d27883d8\/RFC_4251_-_The_Secure_Shell__SSH__Protocol_Architecture\" target=\"_blank\" rel=\"noreferrer noopener\">Link<\/a><\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img decoding=\"async\" src=\"https:\/\/www.ssh.com\/hs-fs\/hubfs\/SSH_Client_Server.png?width=1112&amp;name=SSH_Client_Server.png\" alt=\"\"\/><figcaption>From SSH.com<\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg\" alt=\"\" class=\"wp-image-1897\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg 150w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150@2x.jpg 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><div class=\"smb-balloon__name\">Me<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#f78da7;border-color:#f78da7\"><p>What are the options to initiate SSH?<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>Amongst the several methods available the most common ones are <code>passwords<\/code> and <code>public key authentication<\/code>.<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>In most of automation cases the public key authentication method is preferred. (ANSIBLE uses it)<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg\" alt=\"\" class=\"wp-image-1897\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg 150w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150@2x.jpg 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><div class=\"smb-balloon__name\">Me<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#f78da7;border-color:#f78da7\"><p>Is it driven via a cryptographic key pair &#8211; public key and private key?<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>Duh? <\/p><p>The keys used for authentication are called SSH keys.<\/p><p>Configure the public key on a server to\u00a0authorize access\u00a0and grant anyone who has a copy of the private key access to the server. <\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg\" alt=\"\" class=\"wp-image-1897\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150.jpg 150w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/IMG_20170325_153940-150x150@2x.jpg 300w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/div><div class=\"smb-balloon__name\">Me<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#f78da7;border-color:#f78da7\"><p>But WHY Public key?<\/p><\/div><\/div>\n\n\n\n<div class=\"wp-block-snow-monkey-blocks-balloon smb-balloon smb-balloon--reverse wp-block-snow-monkey-blocks-balloon-is-layout-constrained\"><div class=\"smb-balloon__person\"><div class=\"smb-balloon__figure\"><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2022\/01\/sdk-150x150.png\" alt=\"\" class=\"wp-image-1874\"\/><\/div><div class=\"smb-balloon__name\">SSH<\/div><\/div><div class=\"smb-balloon__body is-layout-constrained wp-block-balloon-is-layout-constrained\" style=\"background-color:#8ed1fc;border-color:#8ed1fc\"><p>&#8211; Why not &#8211; It is passwordless login, and yet more secure?<\/p><p>&#8211; The motivation for using public key authentication over simple passwords is security.<\/p><p>&#8211; Public key authentication provides cryptographic strength that even extremely long passwords can not offer<\/p><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1395,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[34,239],"tags":[21,246],"class_list":["post-2184","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-technical","category-technical-2","tag-learn","tag-ssh","post_format-post-format-image"],"_links":{"self":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/2184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/comments?post=2184"}],"version-history":[{"count":0,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/2184\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media\/1395"}],"wp:attachment":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media?parent=2184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/categories?post=2184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/tags?post=2184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}