The Secure Shell (SSH) protocol

SSH has become a very popular network protocol for performing secure data communication between two computers. Both of the parts in communication use SSH key pairs to encrypt their communications. Each key pair has one private and one public key. The public key can be published to anyone who may be interested in that. The private key is always kept private and secure from everyone except the owner of the key.

Public and private SSH keys can be generated and digitally signed by a certification authority (CA). These keys can also be generated with tools from the command line, such as ssh-keygen.

When the SSH client connects to a server securely, it registers the public key of the server in a special file that ...

Get Mastering Python for Networking and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.