OpenSSH key management Part 1分析和总结分析和总结.docxVIP

  • 0
  • 0
  • 约1.66万字
  • 约 8页
  • 2023-04-25 发布于上海
  • 举报

OpenSSH key management Part 1分析和总结分析和总结.docx

Disclaimer : Disclaimer : The original version of this article was first published on IBM developerWorks, and is property of Westtech Information Services. This document is an updated version of the original article, and contains various improvements made by the Gentoo Linux Documentation team. This document is not actively maintained. OpenSSH key management, Part 1 Content: Understanding RSA/DSA authentication Many of us use the excellent OpenSSH (see Resources later in this article) as a secure, encrypted replacement for the venerable telnet and rsh commands. One of OpenSSHs more intriguing features is its ability to authenticate users using the RSA and DSA authentication protocols, which are based on a pair of complementary numerical keys. As one of its main appeals, RSA and DSA authentication promise the capability of establishing connections to remote systems without supplying a password. While this is appealing, new OpenSSH users often configure RSA/DSA the quick and dirty way, resulting in passwordless logins, but opening up a big security hole in the process. What is RSA/DSA authentication? SSH, specifically OpenSSH (a completely free implementation of SSH), is an incredible tool. Like telnet or rsh, the ssh client can be used to log in to a remote machine. All thats required is for this remote machine to be running sshd, the ssh server process. However, unlike telnet, the ssh protocol is very secure. It uses special algorithms to encrypt the data stream, ensure data stream integrity and even perform authentication in a safe and secure way. However, while ssh is really great, there is a certain component of ssh functionality that is often ignored, dangerously misused, or simply misunderstood. This component is OpenSSHs RSA/DSA key authentication system, an alternative to the standard secure password authentication system that OpenSSH uses by default. OpenSSHs RSA and DSA authentication protocols are based on a pair of specially generated cryptographic keys,

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档