Today was my first day on the job as a junior dev(just transitioned careers ), and SSH kicked my butt while I was trying to set up my dev environment. I've spent my afternoon after work watching videos and researching SSH. This is easily the best video on SSH. Thank you for sharing this information with the community.
It is like.. I have a doubt.. i come to your channel with 0 knowledge.. search the keyword.. get it here.. and i definetely go back with a good content.. You are actually creating livelihoods for people with your knowledge.. (PS: and then i show off my knowledge :D ha ha) Thanks a lot.. please continue educating us..!!
From Lahore Pakistan. ALLAH bless you, Ameen. You explained this SSH in a very super duper easy way. And Yes Sir please stay home and stay safe. MAY ALLAH take India out from this hell situation Ameen.
Raghav - thank you for this video. It is super helpful to me. But I have one question about the two key process. At 9:51 in the video, this makes sense, but I recently saw a different video describing it in this way -> Step 1: Client sends connection request to Server. Step 2: Server sends Client a random string that is encrypted using the Public Key Step 3: Client DECRYPTS this random string using the Private Key, and sends back information to the Server that proves that it indeed decrypted it. Step 4: Server authenticates this information. As you can tell, this process that I described is similar, but the client does the decrypting. In your video, Step 3 shows the client ENCRYPTING the message for the SERVER to decrypt. I wanted to ask you if both processes are viable, and if they have different names, or if one of these processes is incorrect. Trying to sort this stuff out while learning about SSH and any input would be greatly appreciated!
JP Let's delve into the intricacies of SSH key-based authentication. It's great that you're exploring this topic, and I'll clarify the processes for you. 1. SSH Key Pair Generation: - Client: The client generates an SSH key pair consisting of a public key and a private key. - Public Key: The public key is shared with the server. - Private Key: The private key remains securely on the client machine. 2. Server Configuration: - The server stores the client's public key in a special file (usually `~/.ssh/authorized_keys`). - The server marks the public key as approved for authentication. 3. Authentication Process: - When the client connects to the server: - The server sends a random string to the client. - The client encrypts this random string using its private key. - The client sends the encrypted string back to the server. - The server decrypts the received string using the public key. - If successful, the server authenticates the client. Now, let's address the difference you noticed: - Your Description: - The client decrypts the random string using its private key. - The client then sends back information to the server. - The server authenticates based on this information. - Video Description (as per your observation): - The client encrypts the random string using its private key. - The server decrypts the received string using the client's public key. - If successful, the server authenticates the client. Both processes are viable and achieve the same goal: secure authentication using SSH keys. The video's approach emphasizes the client's role in encrypting the message, while your description highlights the client's role in decrypting it. These are two sides of the same cryptographic coin In summary, both methods are correct, and they don't have different names. The key pair ensures secure communication, and the specific steps may vary slightly in how they're described Keep exploring, and feel free to ask more questions as you learn..
Thank you so much sir. I heard this term yesterday. And I can say now, that I know that how SSH is working in basic level. I loved the way you had explained using transferring locked box between two friends. Thank you so much sir:)
Really a nice video, I did watch few videos so far, did not get clear idea about ssh process. The way you presented the topic is awesome. Thank you Raghav
Hi Ebrahim, the person needs to have the authentic private key. Also it is recommended to secure your private key with password, so just in case someone gets access to you private key, he will still need to provide password to use it.
Great Explanation! Can you please explain how SSL and SSL certs work with an analogy? If you can show us how to Create and replace certs in a server that would be great!!
Sorry but you are wrong, minute 10:04 privates keys are used for decryption ONLY, the public key is the one used for encryption. The server must send its public key to the client so that the client can encrypt information sent to the server.
Hi Sarthak Both these mechanisms are performed during the initial setup phase of an SSH session, and are not repeated in every message exchange. However, they are in place throughout the duration of the SSH session to ensure message integrity and prevent packet loss due to interleaving.
Hi Sir In Password-based authentication, if I enter a password and click on ENTER button. Now hackers may see my password in between the client and server channel. when the secure connection will be open, after the correct password providing or before.
u say tat the security is coz of encryption. so if not encrypted then wat exactly is the risk ? do u mean a hacker cn use some tools to do network sniffing and get access to the data or sumthing like tat ?? coz im new to all this and im confused wen i hear things like "not secure" ive also heard tat in http vs https
Hello Sir, I watched your video to understand the ssh. I have a doubt over the flow that you explained in the last. As we know that ssh uses public-key cryptography where a message encrypted using public can only be decrypted by its private key. But in your flow, at last, you said that the client encrypts the message sent by the server with the private key, and then sends it to the server, then the server decrypts it using the public key.
Hi Raghav, I am getting permission denied all the time when i try to enter into the machine, passwords are correct. The first step runs successfully (sequence completed) but in the very next step when i enter password, permission denied. How to solve this problem??
Today was my first day on the job as a junior dev(just transitioned careers ), and SSH kicked my butt while I was trying to set up my dev environment. I've spent my afternoon after work watching videos and researching SSH. This is easily the best video on SSH. Thank you for sharing this information with the community.
So happy to know it
true this one helped me a lot
It is like.. I have a doubt.. i come to your channel with 0 knowledge.. search the keyword.. get it here.. and i definetely go back with a good content.. You are actually creating livelihoods for people with your knowledge.. (PS: and then i show off my knowledge :D ha ha) Thanks a lot.. please continue educating us..!!
So humbled to read your message Sveta
From Lahore Pakistan. ALLAH bless you, Ameen. You explained this SSH in a very super duper easy way. And Yes Sir please stay home and stay safe. MAY ALLAH take India out from this hell situation Ameen.
Raghav - thank you for this video. It is super helpful to me. But I have one question about the two key process.
At 9:51 in the video, this makes sense, but I recently saw a different video describing it in this way ->
Step 1: Client sends connection request to Server.
Step 2: Server sends Client a random string that is encrypted using the Public Key
Step 3: Client DECRYPTS this random string using the Private Key, and sends back information to the Server that proves that it indeed decrypted it.
Step 4: Server authenticates this information.
As you can tell, this process that I described is similar, but the client does the decrypting. In your video, Step 3 shows the client ENCRYPTING the message for the SERVER to decrypt.
I wanted to ask you if both processes are viable, and if they have different names, or if one of these processes is incorrect. Trying to sort this stuff out while learning about SSH and any input would be greatly appreciated!
JP
Let's delve into the intricacies of SSH key-based authentication. It's great that you're exploring this topic, and I'll clarify the processes for you.
1. SSH Key Pair Generation:
- Client: The client generates an SSH key pair consisting of a public key and a private key.
- Public Key: The public key is shared with the server.
- Private Key: The private key remains securely on the client machine.
2. Server Configuration:
- The server stores the client's public key in a special file (usually `~/.ssh/authorized_keys`).
- The server marks the public key as approved for authentication.
3. Authentication Process:
- When the client connects to the server:
- The server sends a random string to the client.
- The client encrypts this random string using its private key.
- The client sends the encrypted string back to the server.
- The server decrypts the received string using the public key.
- If successful, the server authenticates the client.
Now, let's address the difference you noticed:
- Your Description:
- The client decrypts the random string using its private key.
- The client then sends back information to the server.
- The server authenticates based on this information.
- Video Description (as per your observation):
- The client encrypts the random string using its private key.
- The server decrypts the received string using the client's public key.
- If successful, the server authenticates the client.
Both processes are viable and achieve the same goal: secure authentication using SSH keys. The video's approach emphasizes the client's role in encrypting the message, while your description highlights the client's role in decrypting it. These are two sides of the same cryptographic coin
In summary, both methods are correct, and they don't have different names. The key pair ensures secure communication, and the specific steps may vary slightly in how they're described
Keep exploring, and feel free to ask more questions as you learn..
The Day begins with your video about SSH. It was awesome and clear explanation with example. Thanks Raghav.
Most welcome!
really, this box example now clear the funda of ssh that how it is secure & how it works. Thanks for making this valuable video.
Glad it helped Dayanand
You are my guru for years 🙏🏼🙏🏼🙏🏼🙏🏼
Humbled to know this Nandhini
Hi Raghav,
It was a good Explanation.
You are doing a Great Job of sharing your knowledge which is helping many of us.
Keep up the Good Work !!
Most welcome Arun
Thank you! I finally understand how public/private key encryption works!
Glad it helped Scott
Thank you so much sir. I heard this term yesterday. And I can say now, that I know that how SSH is working in basic level.
I loved the way you had explained using transferring locked box between two friends.
Thank you so much sir:)
Excellent Hari
Thank you, Raghav. Great expalination!
Most welcome Rachit
Thank you for the short but clear explanation....
Glad it was helpful Ragesh
Thank you for providing this great resource.
Very grateful to you.🤝👏👏
Most welcome Sundar
Miraculous explanation... crystal clear...
Thanks Sophiya
It is simply an amazing overview, On point explanation. Thanks for sharing amazing information.
Keep uploading this kind of informative videos for us.
So nice of you
it's absolutely great explain 👏👏👏
Glad it was helpful!
Thank you very much Sir . Your student from Philippines ☺️
You are very welcome Jimmel
Great video
Nice explanation sir thank you very much.
You are most welcome Ayush
sir you are simply best i am working past 1 year but today i understood exact scene thankyou my teacher
You are most welcome Pooja
Great presentation!
Thanks for watching Odunayo
Thanks for clearing my doubt 🙏🙏🙏
Most welcome Biswa
Nice video.. Thanks for the explicit and careful explanation.
Glad it was helpful
please continue educating us.Thanks!
Most welcome Madhavan
Really a nice video, I did watch few videos so far, did not get clear idea about ssh process. The way you presented the topic is awesome. Thank you Raghav
You are most welcome
Great Content sir. Tq for providing.
Always welcome
It would be helpful if u make videos to clear interviews explaining real time scenerios
I will do
Thanks for the simple explanations
You're welcome John
Very well explained sir 🎉
Thanks and welcome Neha
Great explanation!
Glad it was helpful Niyaz
Thank you so much for this video and the link to the conversation between mickey and minnie on ssh.
Most welcome Lucky
Very well explained and used Git as example make it more easy to understand
Thanks a lot
Very clear Explanation. 🙏 thanks lot
Most welcome Srikanth
This is superb ... Thank you very much Sir.
You are most welcome Kamalesh
These information are gold dust
Thanks Rajeesh
Thank you sir for the clear explanation
Most welcome
Thanks for the info . Keep continuing your good work
Thanks, will do!
Beautifully explained. Thanks
Most welcome Saurabh
Thanks for the clear explanation in the video. Deeply appreciate your knowledge sharing...
Glad it was helpful Jaikishan
Such a wonderful explanation Raghav. You are a great guy :)..
Thanks for watching Sandeep
Too good man.. very well explained..
Thanks a ton Ganesh
Very nicely done! Thank you!
Most welcome Elavenil
Excellent explanation 👌👏👏👏👏
Thanks for watching Tulasi
dhanywaada guruji
Most welcome Yogesh
Nice Explanation of SSH
Glad it was helpful Kedar
Thank you for getting the knowledge from you I searched for.
Most welcome Santosh
Thank you so much for this video 💓
Most welcome 😊
Thank you for easy explanation! Good job!
Most welcome
thank you so much , great explanation
Most welcome Ahmed
Thank you for the simple explanation..really helpful.🙏
Most welcome
Thank you Raghav 🙌 . Great explanation!
Glad it was helpful!
Brilliant it was the way you explained can't be any simpler, thank-you
You're welcome!
Simple and clear explanation, thanks 🙏
Glad it was helpful!
Explained very well,I thanking you sir
You are welcome
Amazing video
Thanks
nice lecture on SSH. thanks
Most welcome Arun
good explanation my dear
Thank you 🙂
Nice and simple explanation!
Glad it was helpful!
Great sir,
Waiting for next..
Will be coming next week Dinesh
So helpful.
Glad it was helpful Chaitanya
nice introduction
thanks Tarun
well explained
Thanks Vamsi
nice sir ,u explain very well!!!
Thanks and welcome Manish
Hi Raghav, thanks for the valuable info. Can you please explain how ssl works and how to setup on aws and Onpremise servers
I will plan for that Ram
@@RaghavPal thanks Raghav
Main thing in SSH is related to keys.. but u explained that part in just a minute.
Thanks for watching Karteesh
Thank you Raghav ❤️. I've a question .. can't a man in the middle steal this "box" of info by attaching his key ? Is there any check on the sent key ?
Hi Ebrahim, the person needs to have the authentic private key. Also it is recommended to secure your private key with password, so just in case someone gets access to you private key, he will still need to provide password to use it.
@@RaghavPal Got it! Many thanks for your reply 💜
Super explanation
Thanks Sai
Great video :)
Thanks Dhevan
Great Explanation! Can you please explain how SSL and SSL certs work with an analogy? If you can show us how to Create and replace certs in a server that would be great!!
Sure Radhika, I will plan a session
thanks ! really helpfull
Most welcome Eugene
Good explanation
Thanks and welcome Devendra
May I know which port is used when 2 machines communicate over SSH?
default is port 22, but this can change
Awesome explanation. Thank you 😊
Most welcome Saifuddin
Amazing
Thanks for watching
Sorry but you are wrong, minute 10:04 privates keys are used for decryption ONLY, the public key is the one used for encryption. The server must send its public key to the client so that the client can encrypt information sent to the server.
Hi, I will check that again, thanks for letting me know
thank you for such wonderful explanation
Most welcome Nachiket
NICE Job Raghav like the series school of basics, I would appreciate if you could discuss about Installing SSL certificates and how they work too
Sure Ravi, Keep learning
Very good explanation sir. Thank you very much :)
You are most welcome
does the two lock mechanism happen in every message exchange?
Hi Sarthak
Both these mechanisms are performed during the initial setup phase of an SSH session, and are not repeated in every message exchange. However, they are in place throughout the duration of the SSH session to ensure message integrity and prevent packet loss due to interleaving.
Hi Sir
In Password-based authentication, if I enter a password and click on ENTER button. Now hackers may see my password in between the client and server channel.
when the secure connection will be open, after the correct password providing or before.
Hi Arun,
will check on this
@@RaghavPal hi sir did you got any information?
Kindly need a step by step video on automation testing about azure data lake/factory/blob etc.
Will check on this Suhasini
@@RaghavPal thank you raghav
u say tat the security is coz of encryption. so if not encrypted then wat exactly is the risk ? do u mean a hacker cn use some tools to do network sniffing and get access to the data or sumthing like tat ?? coz im new to all this and im confused wen i hear things like "not secure" ive also heard tat in http vs https
Hi Czar, yes so without encryption it will be a step easier for hackers, I am going a plan a security testing Q&A soon. that will help
@@RaghavPal thanks man
awesome>>>>
Thanks a lot Lochan
Nice Video :)
Thanks for the visit
Thankyou boss ❤️🫂
You’re welcome Deepak
Very nice 👍
Thanks for watching Prakash
Thanks ...Nice explanation
You are welcome Tanveer
Hello Sir, I watched your video to understand the ssh. I have a doubt over the flow that you explained in the last. As we know that ssh uses public-key cryptography where a message encrypted using public can only be decrypted by its private key. But in your flow, at last, you said that the client encrypts the message sent by the server with the private key, and then sends it to the server, then the server decrypts it using the public key.
Hi Abhay, pls check this too - automationstepbystep.com/2020/07/23/a-story-of-ssh-secure-shell/
@@RaghavPal Thank you sir, do we have more link that shows actually how authentication takes place.
will need to search more online
you need to make a correction. encryption happens using the public key and decryption happens using the private key
Hi Raghav, Thank you very much for your explanation. Got any chances to migrate openssh key from windows to another windows ?
Not yet, will need to check online
@@RaghavPal Thanks Raghav
in my hpc server my gpu node is showing down how to activate it using ssh commands can you please tell me
Hi Manoj, I will need to check details
Damm nailed the explanation 👏
Thanks Toshit
Thank you so much
Most welcome Poorna
Hello, Good Morning, it was a superb content you have provided. So do we have any video related to openSSH? please do send. Thank you!
not specific to open ssh.. can also read this story - automationstepbystep.com/2020/07/23/a-story-of-ssh-secure-shell/
Hi Raghav,
I am getting permission denied all the time when i try to enter into the machine, passwords are correct. The first step runs successfully (sequence completed) but in the very next step when i enter password, permission denied. How to solve this problem??
Hi Priya, will need to check your setup
@@RaghavPal Please suggest a way to check setup??
Bless you Raghav. So simple and useful explanation. Please could you also explain about Putty ?
I will do Peddi
Your all videos are very helpful.
If possible, please create few videos for shell scripting topic.
Thanks for creating nice videos, God bless
Sure, I will do
If in server we have a more number of public keys how the server identifies using which key it should decrypt the message??
Hi Singaravelan, there is cryptographic fingerprint that is used to uniquely identify the keys.
I like a lot your videos keep going on
Thanks, will do Abdul
Do you have any video on github n gitlab for beginners?
Yes, pls check here - automationstepbystep.com/
thanks sir
Most welcome Nikhil