SSH Authentication

4 September 2024

Overview

SSH authentication aka public key authentication is a password-less login system used to securely connect to remote servers. The authentication involves the generation of key pair files from an asymmetric cryptographic algorithm. SSH is commonly used to transfer files to remote servers like pushing code to GitHub's network.


Generate keys

Commnd to generate key pair:

ssh-keygen -t ed25519 -C "random comment"

Keys generated from the algorithm are (obscurely) related. The public key must be copied into target remote server(s) at location: ~/.ssh/authorized_keys and will be located in the client at ~/.ssh/id_rsa.pub. The server uses the public key to authenticate requests from client's with a matching public key. The private key will be located in the client at location: ~/.ssh/id_rsa.


Authentication Cycle

1. Remote server sends a public key encrypted text challenge to the client.

2. Client decrypts the text using the corresponding private key and sends the response to the server.

3. Server validates the decrypted text from the client's response.

4. If successful; SSH connection is established.


Visual Representation


Connecting to a remote server

ssh root@your_ip


Important files:

Remote server:

  • .ssh/authorized_keys : Public keys of permitted clients
  • ssh/known_hosts : History of fingerprints


Client:

  • ssh/known_hosts : Avoid man-in-the-middle attack
  • .ssh/id_rsa.pub: Public key
  • .ssh/id_rsa: Private key