07-08-2022 10:03 AM - edited 07-08-2022 11:20 AM
Hi Below is process for client such as PC to access a server via ssh. Please see the below "Session Encryption Negotiation" process when a client try to access a server via ssh. Usually we pick up a PC to access the switch via ssh/putty. we do not import any key into the switch and PC. So how the public key in the switch and private key in PC(putty or crt) can match each other? Thank you
Session Encryption Negotiation:
Upon receiving a connection request, the server sends the client a set of supported encryption protocols. The server uses the public key as the authentication method.
The client compares the protocols to its own set. If there are matching protocols, the machines agree to use one to establish the connection.
The client compares the server’s public key to the stored private key stored in its system on the first connection attempt. If the keys match, the client and the server agree to use symmetric encryption to communicate during the SSH session. For this purpose, they communicate using an asymmetrically encrypted process that employs the Diffie-Hellman (DH) key exchange algorithm.
07-08-2022 10:14 AM - edited 07-08-2022 10:14 AM
- Clients will usually try to negotiate most secure cipher, from a client perspective the available ciphers can also be probed with :
% nmap --script ssh2-enum-algos your-switch
M.
07-08-2022 10:51 AM - edited 07-08-2022 01:52 PM
@marce1000 Thanks for your reply. I changed title and description due to original one covering title covering too much. Can you review it again?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide