School Of Basics | What is SSH | How SSH works

Sdílet
Vložit
  • čas přidán 26. 07. 2020
  • more about Raghav - automationstepbystep.com/
    Story of SSH - automationstepbystep.com/2020...
    You can support my mission for education by joining this channel as member - czcams.com/users/automationste...
    Hi, I am Raghav and today we will learn -
    What is SSH
    How SSH Works
    Why SSH was created
    SSH Client
    SSH Server
    SSH Authentication
    Public & Private Keys
    Hit Like and. Subscribe button, if you like this video. It gives me great motivation.
    You can support my mission for education by sharing this knowledge and helping as many people as you can
    If my work has helped you, consider helping any animal near you, in any way you can.
    Other topics in School of Basics
    How Appium works - • School Of Basics | How...
    How Selenium works - • | School Of Basics | S...
    What is API - • School Of Basics | Wha...
    How API works - • School Of Basics | API...

Komentáře • 233

  • @michaelrider9067
    @michaelrider9067 Před 2 lety +16

    Today was my first day on the job as a junior dev(just transitioned careers ), and SSH kicked my butt while I was trying to set up my dev environment. I've spent my afternoon after work watching videos and researching SSH. This is easily the best video on SSH. Thank you for sharing this information with the community.

  • @svetanayanr8930
    @svetanayanr8930 Před 3 lety +44

    It is like.. I have a doubt.. i come to your channel with 0 knowledge.. search the keyword.. get it here.. and i definetely go back with a good content.. You are actually creating livelihoods for people with your knowledge.. (PS: and then i show off my knowledge :D ha ha) Thanks a lot.. please continue educating us..!!

    • @RaghavPal
      @RaghavPal  Před 3 lety +7

      So humbled to read your message Sveta

  • @AbdulRehman-pc2xx
    @AbdulRehman-pc2xx Před 3 lety +3

    From Lahore Pakistan. ALLAH bless you, Ameen. You explained this SSH in a very super duper easy way. And Yes Sir please stay home and stay safe. MAY ALLAH take India out from this hell situation Ameen.

  • @PrabasView
    @PrabasView Před 3 lety +8

    The Day begins with your video about SSH. It was awesome and clear explanation with example. Thanks Raghav.

  • @scottrussell6873
    @scottrussell6873 Před 3 lety +2

    Thank you! I finally understand how public/private key encryption works!

  • @JPH-ps6ic
    @JPH-ps6ic Před 2 měsíci +2

    Raghav - thank you for this video. It is super helpful to me. But I have one question about the two key process.
    At 9:51 in the video, this makes sense, but I recently saw a different video describing it in this way ->
    Step 1: Client sends connection request to Server.
    Step 2: Server sends Client a random string that is encrypted using the Public Key
    Step 3: Client DECRYPTS this random string using the Private Key, and sends back information to the Server that proves that it indeed decrypted it.
    Step 4: Server authenticates this information.
    As you can tell, this process that I described is similar, but the client does the decrypting. In your video, Step 3 shows the client ENCRYPTING the message for the SERVER to decrypt.
    I wanted to ask you if both processes are viable, and if they have different names, or if one of these processes is incorrect. Trying to sort this stuff out while learning about SSH and any input would be greatly appreciated!

    • @RaghavPal
      @RaghavPal  Před 2 měsíci

      JP
      Let's delve into the intricacies of SSH key-based authentication. It's great that you're exploring this topic, and I'll clarify the processes for you.
      1. SSH Key Pair Generation:
      - Client: The client generates an SSH key pair consisting of a public key and a private key.
      - Public Key: The public key is shared with the server.
      - Private Key: The private key remains securely on the client machine.
      2. Server Configuration:
      - The server stores the client's public key in a special file (usually `~/.ssh/authorized_keys`).
      - The server marks the public key as approved for authentication.
      3. Authentication Process:
      - When the client connects to the server:
      - The server sends a random string to the client.
      - The client encrypts this random string using its private key.
      - The client sends the encrypted string back to the server.
      - The server decrypts the received string using the public key.
      - If successful, the server authenticates the client.
      Now, let's address the difference you noticed:
      - Your Description:
      - The client decrypts the random string using its private key.
      - The client then sends back information to the server.
      - The server authenticates based on this information.
      - Video Description (as per your observation):
      - The client encrypts the random string using its private key.
      - The server decrypts the received string using the client's public key.
      - If successful, the server authenticates the client.
      Both processes are viable and achieve the same goal: secure authentication using SSH keys. The video's approach emphasizes the client's role in encrypting the message, while your description highlights the client's role in decrypting it. These are two sides of the same cryptographic coin
      In summary, both methods are correct, and they don't have different names. The key pair ensures secure communication, and the specific steps may vary slightly in how they're described
      Keep exploring, and feel free to ask more questions as you learn..

  • @dayanandswami8109
    @dayanandswami8109 Před 7 měsíci +1

    really, this box example now clear the funda of ssh that how it is secure & how it works. Thanks for making this valuable video.

  • @arun53413
    @arun53413 Před 3 lety +7

    Hi Raghav,
    It was a good Explanation.
    You are doing a Great Job of sharing your knowledge which is helping many of us.
    Keep up the Good Work !!

  • @RachitMalvi
    @RachitMalvi Před 2 lety +3

    Thank you, Raghav. Great expalination!

  • @sundarmishra561
    @sundarmishra561 Před 2 lety +1

    Thank you for providing this great resource.
    Very grateful to you.🤝👏👏

  • @nandhinirajendran1396
    @nandhinirajendran1396 Před 3 lety +5

    You are my guru for years 🙏🏼🙏🏼🙏🏼🙏🏼

    • @RaghavPal
      @RaghavPal  Před 3 lety

      Humbled to know this Nandhini

  • @madhavans8442
    @madhavans8442 Před 3 lety

    please continue educating us.Thanks!

  • @grigoriyz
    @grigoriyz Před 2 lety

    Thank you for easy explanation! Good job!

  • @jaikishank
    @jaikishank Před 2 lety

    Thanks for the clear explanation in the video. Deeply appreciate your knowledge sharing...

    • @RaghavPal
      @RaghavPal  Před 2 lety

      Glad it was helpful Jaikishan

  • @sandeep87raju
    @sandeep87raju Před 3 lety +1

    Such a wonderful explanation Raghav. You are a great guy :)..

  • @tomriddle2427
    @tomriddle2427 Před 3 lety

    Brilliant it was the way you explained can't be any simpler, thank-you

  • @shaikhanuman8012
    @shaikhanuman8012 Před 2 lety

    Great Content sir. Tq for providing.

  • @elaveniltharumarasan5484
    @elaveniltharumarasan5484 Před 7 měsíci

    Very nicely done! Thank you!

  • @shadow_self8564
    @shadow_self8564 Před 2 lety

    Beautifully explained. Thanks

  • @odunayokomolafe9485
    @odunayokomolafe9485 Před 2 lety

    Great presentation!

  • @shrutibansal5261
    @shrutibansal5261 Před 2 lety +1

    Great video

  • @santoshbehera9261
    @santoshbehera9261 Před 3 lety

    Thank you for getting the knowledge from you I searched for.

  • @toallin150
    @toallin150 Před 2 lety

    Thank you Raghav 🙌 . Great explanation!

  • @rajeeshnangariyil3600
    @rajeeshnangariyil3600 Před 2 lety

    These information are gold dust

  • @saifuddinraj8774
    @saifuddinraj8774 Před 3 lety

    Awesome explanation. Thank you 😊

  • @hariprasath838
    @hariprasath838 Před 2 lety +9

    Thank you so much sir. I heard this term yesterday. And I can say now, that I know that how SSH is working in basic level.
    I loved the way you had explained using transferring locked box between two friends.
    Thank you so much sir:)

  • @ThePuneet681
    @ThePuneet681 Před 3 lety

    Simple and clear explanation, thanks 🙏

  • @rageshnc
    @rageshnc Před 3 lety +1

    Thank you for the short but clear explanation....

  • @JohnJohnson-sf5wl
    @JohnJohnson-sf5wl Před 2 lety

    Thanks for the simple explanations

  • @bandlamudi1206
    @bandlamudi1206 Před 3 lety

    Really a nice video, I did watch few videos so far, did not get clear idea about ssh process. The way you presented the topic is awesome. Thank you Raghav

  • @sophiyaanudeep9397
    @sophiyaanudeep9397 Před 2 lety

    Miraculous explanation... crystal clear...

  • @GaneshNayak
    @GaneshNayak Před 3 lety

    Too good man.. very well explained..

  • @dineshdewangan8390
    @dineshdewangan8390 Před 3 lety

    Great sir,
    Waiting for next..

    • @RaghavPal
      @RaghavPal  Před 3 lety +1

      Will be coming next week Dinesh

  • @yavdhesh
    @yavdhesh Před 3 lety

    dhanywaada guruji

  • @karthiknarayan8
    @karthiknarayan8 Před 2 lety

    Thank you for the simple explanation..really helpful.🙏

  • @codenexa1666
    @codenexa1666 Před 9 měsíci

    It is simply an amazing overview, On point explanation. Thanks for sharing amazing information.
    Keep uploading this kind of informative videos for us.

  • @seydangulyesil
    @seydangulyesil Před 3 měsíci

    it's absolutely great explain 👏👏👏

  • @neelakantannilakantanswami4031

    Thanks for the info . Keep continuing your good work

  • @ekleanthony7735
    @ekleanthony7735 Před 2 lety

    Nice video.. Thanks for the explicit and careful explanation.

  • @rogerthat7190
    @rogerthat7190 Před rokem

    Thank you sir for the clear explanation

  • @radhikarao5106
    @radhikarao5106 Před 3 lety +1

    Great Explanation! Can you please explain how SSL and SSL certs work with an analogy? If you can show us how to Create and replace certs in a server that would be great!!

    • @RaghavPal
      @RaghavPal  Před 3 lety

      Sure Radhika, I will plan a session

  • @eugenegorodetsky6494
    @eugenegorodetsky6494 Před 2 lety

    thanks ! really helpfull

  • @MiraclesU123.
    @MiraclesU123. Před 3 lety

    Nice and simple explanation!

  • @mohammadahmedragab837
    @mohammadahmedragab837 Před 2 lety

    thank you so much , great explanation

  • @ayushpatel2171
    @ayushpatel2171 Před 2 lety +1

    Nice explanation sir thank you very much.

  • @kamaleshpramanik7645
    @kamaleshpramanik7645 Před 2 lety

    This is superb ... Thank you very much Sir.

    • @RaghavPal
      @RaghavPal  Před 2 lety

      You are most welcome Kamalesh

  • @whattheydoexactly7794
    @whattheydoexactly7794 Před 3 lety

    thank you for such wonderful explanation

  • @srikanthgandhi7289
    @srikanthgandhi7289 Před 2 lety

    Very clear Explanation. 🙏 thanks lot

  • @biswabhusanswain7528
    @biswabhusanswain7528 Před 2 lety

    Thanks for clearing my doubt 🙏🙏🙏

  • @kedardeuskar3865
    @kedardeuskar3865 Před 3 lety

    Nice Explanation of SSH

  • @RahulWalli
    @RahulWalli Před rokem

    Thank you so much for this video 💓

  • @jimmelbermudez
    @jimmelbermudez Před 2 lety

    Thank you very much Sir . Your student from Philippines ☺️

  • @NehaYT
    @NehaYT Před 8 měsíci

    Very well explained sir 🎉

  • @mahimahesh5616
    @mahimahesh5616 Před 3 lety +2

    It would be helpful if u make videos to clear interviews explaining real time scenerios

  • @vitteshwarayaramanavenky2187

    Explained very well,I thanking you sir

  • @tulasiramsunkara
    @tulasiramsunkara Před 3 lety

    Excellent explanation 👌👏👏👏👏

  • @chaitanyakrishna9398
    @chaitanyakrishna9398 Před 2 lety

    So helpful.

    • @RaghavPal
      @RaghavPal  Před 2 lety

      Glad it was helpful Chaitanya

  • @wmchow8943
    @wmchow8943 Před rokem

    Very well explained and used Git as example make it more easy to understand

  • @dhevanrajandran7632
    @dhevanrajandran7632 Před 2 lety

    Great video :)

  • @luckyadeloye3452
    @luckyadeloye3452 Před 2 lety

    Thank you so much for this video and the link to the conversation between mickey and minnie on ssh.

  • @oguzhantopaloglu9442
    @oguzhantopaloglu9442 Před rokem

    Amazing video

  • @vkrishna606
    @vkrishna606 Před 2 lety

    well explained

  • @arunprasad8261
    @arunprasad8261 Před 3 lety

    nice lecture on SSH. thanks

  • @tanveersyed1049
    @tanveersyed1049 Před 3 lety

    Thanks ...Nice explanation

  • @vaibhavppandey
    @vaibhavppandey Před 3 lety

    Very good explanation sir. Thank you very much :)

  • @poojagupta-nk7rq
    @poojagupta-nk7rq Před 3 lety

    sir you are simply best i am working past 1 year but today i understood exact scene thankyou my teacher

  • @anuragsandhu9590
    @anuragsandhu9590 Před 3 lety +1

    Amazing

  • @tarunarora3266
    @tarunarora3266 Před rokem

    nice introduction

  • @ravimohanboggula8117
    @ravimohanboggula8117 Před 3 lety

    NICE Job Raghav like the series school of basics, I would appreciate if you could discuss about Installing SSL certificates and how they work too

  • @Manish_Kumar_Bihar
    @Manish_Kumar_Bihar Před 3 lety

    nice sir ,u explain very well!!!

  • @devendradhillon4204
    @devendradhillon4204 Před 3 lety

    Good explanation

  • @ywahab25
    @ywahab25 Před 8 měsíci

    good explanation my dear

  • @sailakshmankinthali6501

    Super explanation

  • @kommuram5435
    @kommuram5435 Před 3 lety +1

    Hi Raghav, thanks for the valuable info. Can you please explain how ssl works and how to setup on aws and Onpremise servers

  • @priyapatel8711
    @priyapatel8711 Před rokem

    Nice Video :)

  • @PoornaCW
    @PoornaCW Před 2 lety

    Thank you so much

  • @abdul9910
    @abdul9910 Před 3 lety

    I like a lot your videos keep going on

  • @toshitsingh7270
    @toshitsingh7270 Před 2 lety

    Damm nailed the explanation 👏

  • @vetribull8318
    @vetribull8318 Před 3 lety

    Hi Raghav, Thank you very much for your explanation. Got any chances to migrate openssh key from windows to another windows ?

  • @xyz123636
    @xyz123636 Před 3 lety

    Your all videos are very helpful.
    If possible, please create few videos for shell scripting topic.
    Thanks for creating nice videos, God bless

  • @Rhythmicwalker
    @Rhythmicwalker Před 3 lety

    Very nice 👍

  • @devyetii
    @devyetii Před 3 lety +1

    Thank you Raghav ❤️. I've a question .. can't a man in the middle steal this "box" of info by attaching his key ? Is there any check on the sent key ?

    • @RaghavPal
      @RaghavPal  Před 3 lety +1

      Hi Ebrahim, the person needs to have the authentic private key. Also it is recommended to secure your private key with password, so just in case someone gets access to you private key, he will still need to provide password to use it.

    • @devyetii
      @devyetii Před 3 lety

      @@RaghavPal Got it! Many thanks for your reply 💜

  • @karteeshkumarvipparapelli7347

    Main thing in SSH is related to keys.. but u explained that part in just a minute.

  • @avakasavaadhi4726
    @avakasavaadhi4726 Před 2 lety +1

    May I know which port is used when 2 machines communicate over SSH?

    • @RaghavPal
      @RaghavPal  Před 2 lety +1

      default is port 22, but this can change

  • @MahaPSaranu
    @MahaPSaranu Před 3 lety

    Bless you Raghav. So simple and useful explanation. Please could you also explain about Putty ?

  • @sarthakgupta7955
    @sarthakgupta7955 Před rokem

    does the two lock mechanism happen in every message exchange?

    • @RaghavPal
      @RaghavPal  Před rokem

      Hi Sarthak
      Both these mechanisms are performed during the initial setup phase of an SSH session, and are not repeated in every message exchange. However, they are in place throughout the duration of the SSH session to ensure message integrity and prevent packet loss due to interleaving.

  • @NikhilSingh-hc7td
    @NikhilSingh-hc7td Před 3 lety

    thanks sir

  • @canadatorontovideos7283

    Kindly need a step by step video on automation testing about azure data lake/factory/blob etc.

  • @singaravelann3671
    @singaravelann3671 Před 3 lety

    If in server we have a more number of public keys how the server identifies using which key it should decrypt the message??

    • @RaghavPal
      @RaghavPal  Před 3 lety

      Hi Singaravelan, there is cryptographic fingerprint that is used to uniquely identify the keys.

  • @arunbandari8936
    @arunbandari8936 Před 2 lety

    Hi Sir
    In Password-based authentication, if I enter a password and click on ENTER button. Now hackers may see my password in between the client and server channel.
    when the secure connection will be open, after the correct password providing or before.

  • @bharathkumarchalla3558

    thankyou so much its very small word to say....but thanks

  • @manojkumarneesu2773
    @manojkumarneesu2773 Před 2 lety

    in my hpc server my gpu node is showing down how to activate it using ssh commands can you please tell me

    • @RaghavPal
      @RaghavPal  Před 2 lety

      Hi Manoj, I will need to check details

  • @abhaypatidar7948
    @abhaypatidar7948 Před 3 lety

    Hello Sir, I watched your video to understand the ssh. I have a doubt over the flow that you explained in the last. As we know that ssh uses public-key cryptography where a message encrypted using public can only be decrypted by its private key. But in your flow, at last, you said that the client encrypts the message sent by the server with the private key, and then sends it to the server, then the server decrypts it using the public key.

    • @RaghavPal
      @RaghavPal  Před 3 lety

      Hi Abhay, pls check this too - automationstepbystep.com/2020/07/23/a-story-of-ssh-secure-shell/

    • @abhaypatidar7948
      @abhaypatidar7948 Před 3 lety

      @@RaghavPal Thank you sir, do we have more link that shows actually how authentication takes place.

    • @RaghavPal
      @RaghavPal  Před 3 lety

      will need to search more online

    • @gxp9223
      @gxp9223 Před 2 lety

      you need to make a correction. encryption happens using the public key and decryption happens using the private key

  • @BlokeBritish
    @BlokeBritish Před 3 lety

    u say tat the security is coz of encryption. so if not encrypted then wat exactly is the risk ? do u mean a hacker cn use some tools to do network sniffing and get access to the data or sumthing like tat ?? coz im new to all this and im confused wen i hear things like "not secure" ive also heard tat in http vs https

    • @RaghavPal
      @RaghavPal  Před 3 lety +1

      Hi Czar, yes so without encryption it will be a step easier for hackers, I am going a plan a security testing Q&A soon. that will help

    • @BlokeBritish
      @BlokeBritish Před 3 lety

      @@RaghavPal thanks man

  • @aditifabregas
    @aditifabregas Před 2 lety

    How can the server (remote machine) decrypt with public key? Then the very purpose of encryption is lost.

    • @RaghavPal
      @RaghavPal  Před 2 lety

      I will try to add a detailed session Aditi

  • @priyaigu1306
    @priyaigu1306 Před rokem

    Hi Raghav,
    I am getting permission denied all the time when i try to enter into the machine, passwords are correct. The first step runs successfully (sequence completed) but in the very next step when i enter password, permission denied. How to solve this problem??

    • @RaghavPal
      @RaghavPal  Před rokem

      Hi Priya, will need to check your setup

    • @priyaigu1306
      @priyaigu1306 Před rokem

      @@RaghavPal Please suggest a way to check setup??

  • @honeybunny9977
    @honeybunny9977 Před 3 lety

    Do you have any video on github n gitlab for beginners?

    • @RaghavPal
      @RaghavPal  Před 3 lety +1

      Yes, pls check here - automationstepbystep.com/

  • @honeybunny9977
    @honeybunny9977 Před 3 lety

    Hi Raghav....what is the difference between Putty and ZOC?

    • @RaghavPal
      @RaghavPal  Před 3 lety +1

      Hi, I have not used ZOC, Can find more here -
      en.wikipedia.org/wiki/Comparison_of_SSH_clients
      www.slant.co/versus/499/5495/~putty_vs_zoc-terminal

  • @arek6296
    @arek6296 Před rokem

    gold

  • @abdullamasud4278
    @abdullamasud4278 Před rokem

    If someone has my private key, will that someone be able to encrypt the random message and access the remote system? if so, what makes it different than using a password? I am sorry if I sound naive here ^^ Just trying to understand it better

    • @RaghavPal
      @RaghavPal  Před rokem

      Hi Abdulla, this has good explanation of this concept
      www.ssh.com/academy/ssh/public-key-authentication
      sectigo.com/resource-library/what-is-an-ssh-key

    • @RaghavPal
      @RaghavPal  Před rokem

      Hi Abdulla, this has good explanation of this concept
      sectigo.com/resource-library/what-is-an-ssh-key
      www.ssh.com/academy/ssh/public-key-authentication

    • @thebattinson1278
      @thebattinson1278 Před rokem

      Then u are fucked 🤣
      To be serious, a private key is way more secure than a password and cannot be brute forced.
      U can also add a layer of security with a passphrase for your private key.
      So if someone stole your private key, he won't be able to use it in another machine.