Intro to SSH and SSH Keys

preview_player
Показать описание
SSH (Secure Shell) serves as one of the core authentication technologies for privileged access, enabling access to Unix/Linux systems, routers, switches, firewalls, etc. In spite of it's important role in security, many security executives don't have a basic understand of SSH. This short clip provides an introduction.
Рекомендации по теме
Комментарии
Автор

Thank you very much for simple and extremely easy way explaining SSH, some instructors or professors make things very difficult for their students, those instructors want to feel important and smart by not sharing the simple and easy method with their students, I hope you make more videos thank you, Sir.

mattjoe
Автор

SSH was developed by Tatu Ylönen. He was my friend at student time 😊😊

tapsulinka
Автор

Best video on How SSH really works.. thanks!!

Is there any video on resolving the plethora of keys or inventory management?

inderdhami
Автор

Excellent presentation with soothing voice, context, perspective and technical details.

punjabimitti
Автор

are these keys persistent ? What should we do make sure keys are persistent?

chandrasekharavajpayeemadd
Автор

you should make more videos, they are really well done :)

Marceau.
Автор

You may want to annotate the video. Windows 10 supports SSH client and server natively :)

zj
Автор

Excellent video on SSH. Very nice explanation.

ayasswain
Автор

Absolutely brilliant ! Helped my understand this vague concept in just few minutes

ameyapatil
Автор

Please make more videos...Thanks a lot for this

piyushkhare
Автор

I maybe the odd one out here. But the keys explanation didn't make any sense to know how they work step by step.

engalipak
Автор

Good video. But the voice of the narrator is feeble.

NadeemInamdar
Автор

very good, thanks for sharing your knowledge

ujjwalghatak
Автор

By far best video on ssh keys on youtube

shivmmehrotra
Автор

Q. What happens if the public-key received in the very first connect instance is another server’s ? Could the security of the intended server be compromised ? How would an intermediary server be able to hack in then ? Pls explain briefly if possible to make it crystal.

RayAvijeet
Автор

It's a joke, right? Only 446 subscribers? This is as unfair as, lets say, Jesus scarifying himself in solitude and being forgotten by men or history. People are stupid. SSH IS GREAT! And wait, did I write 446? I meant 447, mb ;)

luacode.x
Автор

What’s the purpose of the servers having their own private key? (The orange and blue, not the green.) Now, I understand the purpose of the administrator having a private key, it is needed to initiate the process of the server authenticating that said administrator can be trusted, but why does the server need a private key? The server asks us if we trust it, so does the private key give an extra warning that we can trust it (without it it would give us an extra warning that we can’t trust it?), and it’s just double checking with us (via a prompt using the server’s public key) to make sure that we do trust it?

Also, just to clarify, are all of these SSH keys? And similar to public keys from servers needing to be manually verified by the administrator (via prompt), do the servers need to have the administrator manually place their user keys (grey) onto the servers’ authorized keys file? Or is it automated when the server identifies that the user owns a private key?

liliacfury
Автор

It looks like Windows 10 (as of January 2018) come with SSH as an optional feature in beta version

MidwestDIY
Автор

Nice video. I use public/private keys in openvpn software. But i was wondering how it works on cisco or other network devices since the user who logs into it via ssh doesn't have a private key, he or she, only types the username/password.

juanjosecastro
Автор

I've searched lot of videos, and this is the first one that explain this topic so well.
Very good explanation, it helped me alot. thanks

אליהובראל