13,420
edits
Changes
no edit summary
=== Part 2: Establishing a Safe SSH Connection: Public Key Authentication ===
As a system administrator, you have the ability to generate or create '''public''' and '''private''' keys to ensure safe and secure ssh connections. The system administer can generate these keys for the first time, of or if they suspect the system administor suspects that a hacker has compromised or trying to penetrate the server, they can remove the existing keys and generate new keys. A common type of attack, '''Arp Poisoning (Man in the Middle Attack)''', can be used to <u>redirect </u> packets to a third party while maintaining the illusion that the connection is secure. Therefore, understanding about the generation and management of public/private keys are important to the security of servers.