LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices

Reply
 
Search this Thread
Old 06-20-2009, 05:59 PM   #1
evil_empire
Member
 
Registered: Mar 2005
Distribution: Fedora Core 3
Posts: 176

Rep: Reputation: 31
ssh 2 keys authentication


Hi,
ssh utilizes 2 keys(public & private) in such a manner that one only authenticates, the other only encrypts. Is this true?
Can anyone explain, which one encrypts, which one decrypts and little info on how it works?
 
Old 06-20-2009, 11:34 PM   #2
anomie
Senior Member
 
Registered: Nov 2004
Location: Texas
Distribution: RHEL, Scientific Linux, Debian, Fedora, Lubuntu, FreeBSD
Posts: 3,930
Blog Entries: 5

Rep: Reputation: Disabled
Simple version: public key encrypts, private key decrypts.

Better version: http://en.wikipedia.org/wiki/Public-key_cryptography

For a few details on how it's implemented with openssh, see the "Authentication" section here: http://www.openbsd.org/cgi-bin/man.c...=ssh&sektion=1
 
Old 06-21-2009, 12:23 PM   #3
evil_empire
Member
 
Registered: Mar 2005
Distribution: Fedora Core 3
Posts: 176

Original Poster
Rep: Reputation: 31
Hi anomie,
Thank you very much for the info. I've got one more question. In my original questions is "authenticates" same as "decrypts". Will it be correct to say one key authenticates and the other encrypts? I know this question is dumb since you've already told me public key encrypts and private key decrypts.
 
Old 06-22-2009, 12:10 PM   #4
anomie
Senior Member
 
Registered: Nov 2004
Location: Texas
Distribution: RHEL, Scientific Linux, Debian, Fedora, Lubuntu, FreeBSD
Posts: 3,930
Blog Entries: 5

Rep: Reputation: Disabled
Read through the RFC here:

http://www.ietf.org/rfc/rfc4252.txt

Quote:
7. Public Key Authentication Method: "publickey"

The only REQUIRED authentication 'method name' is "publickey"
authentication. All implementations MUST support this method;
however, not all users need to have public keys, and most local
policies are not likely to require public key authentication for all
users in the near future.

With this method, the possession of a private key serves as
authentication. This method works by sending a signature created
with a private key of the user. The server MUST check that the key
is a valid authenticator for the user, and MUST check that the
signature is valid. If both hold, the authentication request MUST be
accepted; otherwise, it MUST be rejected. Note that the server MAY
require additional authentications after successful authentication.

...
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
SSH host keys VS SSH keys kenneho Linux - Security 3 09-11-2008 06:03 AM
How to upgrade openssh without disturbing old authentication keys avijitp Linux - Software 1 07-06-2007 05:56 PM
Open SSH authentication using public keys Xiiph Linux - Software 8 01-05-2007 08:58 AM
SSH public/private key authentication with GnuPG keys? thinksincode Linux - Security 1 02-25-2005 02:33 PM
Configuring SSH to accept only keys (already have keys) fr0st Linux - Security 3 11-04-2003 03:31 AM


All times are GMT -5. The time now is 04:02 AM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration