When I do ssh to LINUX machine from windows using ssh client, first time it will display certificate, then it will ask y / n?. Where it will keep that certificate on windows machine?. any idea what is the advantage of ssh, does it do any encryption?. Is it secures connection?.
9 2569
I don't know where the generated key is stored on Windows. SSH is highly secure and everything is encrypted. Most anything done securely on *nix uses SSH.
Thanks. First time wehn I do ssh from windows machine to LINUX host, I can see certificate prints on windows machine, it will ask y / n?. if I say yes, then ssh asks for login id, but where windows machine keeps that certificate?. if I do ssh again next time, it won't ask, means windows machine should keep that cert somewhere right?. or LINUX nachine keep track of that?. how can I see those encrypted packets?. can I capture with ethereal?.
I've forgotten the details and my head is elsewhere. If you do a 'man ssh', everything you want to know should be in there except for the Windows stuff.
Just like the good Dr, I do not know where the ssh key for the system you connected to is stored. That is because on Windows, it totally depends on the application that you are using and where it stores its information.
On a Linux/Unix machine, if you connect to another machine and accept the ssh key, it stores that information in the ~/.ssh/known_hosts file.
I would certainly check the documentation for whatever application you are using as it would be storing it for you.
Regards,
Jeff
prn 254
Expert 100+
I don't know where the cert is kept either, but that is because different SSH clients keep them in different places. TERATERM PRO keeps a known_hosts file (ssh_known_hosts) in \Program Files\TTERMPRO. PuTTY, on the other hand, keeps certs in the windows registry. What ssh client are you using?
Paul
So that confirms it. We don't know nuttin'.
prn 254
Expert 100+
tvnaidu said:
thanks. I am using ssh.
Yes. But which ssh?
SSH is a network protocol, but there is also a company ssh.com, which sells an implementation of a client for the protocol. However, there are a number of different implementations of client software for the SSH protocol. We really can't answer a question any better than numberwhun's comment above without knowing which client software you mean.
Paul
Like numberwhun said...in windows, its completely depends on application to maintain the keys..
If you are familiar with putty.exe, it stores the sessions and keys in registry
HKEY_CURRENT_USER\Software\SimonTatham\PuTTY
And, if I am not wrong, please stop calling it as a "certificate".
Since we've never connected to this machine before, and SSH doesn't have the concept of a trusted third party like Certificate Authorities in the world of SSL/TLS, it's up to you to do all the key management yourself. Your client shows you the key fingerprint.
it is basically a server key.
more info: http://www.securityfocus.com/infocus/1806 Sign in to post your reply or Sign up for a free account.
Similar topics
by: Simon |
last post by:
I'm doing a survey.
When do you think GNU/Linux will be ready for the average Joe? What
obstacles must it overcome first?
|
by: Dan V. |
last post by:
Situation:
I have to connect with my Windows 2000 server using VS.NET 2003 and C# and
connect to a remote Linux server at another company's office and query their
XML file. Their file may be...
|
by: Spare Brain |
last post by:
Hi,
I am trying to run the MySQL DB on a Linux machine that is part of a home
LAN (IP=192.168.0.3), while trying to access it from another WinXP machine
(IP=192.168.0.5). I keep getting the...
|
by: Jonah Olsson |
last post by:
Dear All,
I'm currently developing a solution where large amounts of personalised
emails are being created (and no, this is not spam...) on the ASP.NET
platform and being delivered by a Debian...
|
by: Naeem Sarfraz |
last post by:
Any advice for the following situation?
I've deployed my webservice on a remote server, e.g.
http://mywebservice.co.uk/summary.asmx. The windows clients attempts to
access this webservice and...
|
by: mjf |
last post by:
I'd like to connect from any Linux machine to the DB2 on a Linux server
via an IP adddress (or any available method that allows us to connect
to DB2 from another machine). I know we can do it in...
|
by: cranium.2003 |
last post by:
hi,
Here is my code
#include <iostream.h>
int main()
{
cout <<"HI";
return 0;
}
and using following command to compile a C++ program
g++ ex1.cpp -o ex1
|
by: =?Utf-8?B?RGFuaWVs?= |
last post by:
Hi,
Recently I'm confused by this exception.
-----
The message could not be processed. This is most likely because the action
'http://tempuri.org/IBCC2MatrixService/UserMatchingSearch' is...
|
by: tvnaidu |
last post by:
I have Linux machine and windows machine on same network, I want to keep Linux machine as CVS server and windows machine as CVS client, can I keep like that?. My development machine is windows...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
| | |