How does SSH key authentication work?
From the user's point of view, an SSH connection is established like a telnet session (connection request, login request, password request), the principle is actually much more complex. SSH guarantees: Confidentiality: packet encryption guarantees this. The old services such as telnet, rlogin... sent the data in the clear; Integrity: SSH ensures that packets flowing from one host to another are not corrupted; Authentication: each SSH connection verifies the identity of the server (by its host key ~ / .ssh / known_hosts ) then that of the client (by password or public key ~ / .ssh / authorized_keys ); Authorization: it is possible with SSH to limit the actions authorized to the user ( ~ / ssh / .authorization ); Tunneling: SSH is used to secure a service whose information usually circulates in clear (POP, IMAP, VNC...). Other aspects of tunneling are the securing of the X11 protocol (X11forwarding), and the use of private SSH Keys located on a remote host (Agent forwarding). SSH is...