Autonomía digital y tecnológica

Código e ideas para una internet distribuida

Linkoteca. Archivo de navegación


In all, the SSH connection requires two key pairs –

Your Client software checks the Server’s (host) public key against data the server sends encrypted with the host private key. This requires you to have a copy of its public key, which you’re handed at the first connection and your client stores if you approve of it.
The Server checks your authentication data encrypted with your user private key using the copy of your user public key that it has a copy of because you put it there (or had someone put there for you).