How does SSH protocol version 2 work?
Version 2 works similarly to Version 1. Each host has a host-specific DSA key used for identification. However, when the daemon starts, a server key is not generated. Forward security is provided through a Diffie-Hellman key agreement which results in a shared session key. The remainder of the session is encrypted using a symmetric cipher, Blowfish, 3DES or CAST128 in CBC mode or Arcfour. The client selects the encryption algorithm from those offered by the server. Additionally, session integrity is provided through a cryptographic message authentication code (hmac-sha1 or hmac-md5). Protocol version 2 provides a public key based user authentication method (DSA Authentication) and conventional password authentication.
Related Questions
- What does the "Unexpected protocol version sent by the runtime system" message mean ?
- What does the "Unexpected protocol version sent by the runtime system" message mean ?
- Does the File Adapter support the sftp (File Transfer over SSH) protocol?
- How does SSH protocol version 2 work?
- How does SSH protocol version 1 work?
- How does SSH protocol version 1 work?