Open main menu

CDOT Wiki β

Changes

OPS235 Lab 7 - Fedora17

6 bytes added, 19:42, 28 February 2012
no edit summary
=== Investigation 3: How do you establish an ssh connection using Public Key Authentication. ===
{{Admon/note | Note! | Complete this investigation on your '''fedora2 ''' VM.}}
{{Admon/note | | Public Key authentication is a method of establishing identity using a pair of encryption keys that are designed to work together. One key is known as your private key (which as the name suggests should remain private and protected) and the other is known as the public key. (which as the name suggests can be freely distributed) The keys are designed to work together to encrypt data asymmetrically, that is to say that when we encrypt data with one of the keys it can only be decrypted with the other key from the pair. This means that when we connect, ssh can use the private key that only exists on my system in my account, to encrypt a message. That message can be decrypted by anybody with the corresponding public key. While it doesn't mean the message is secure as anybody could decrypt it with the public key, it does establish my identity, if the host can successfully decrypt the message then it must have come from the one person in possession of the private key. This basic method of authentication is used extensively in many network communications protocols that require the ability to authenticate identity.}}
13,420
edits