?
Solved

Why does SSH work with no PKI and no shared secret?

Posted on 2011-09-10
2
Medium Priority
?
569 Views
Last Modified: 2012-05-12
The theory behind secure protocols is - as I understand it - that they rely on symmetric or asymmetric keys.  Either a shared secret or a private/public key pair.  So a question I've had in the back of my mind for some time is:  How is it I can setup a router or firewall and enable ssh on the device and in the next moment SSH to the device from my workstation?  No Certificate Authority has been setup,  and clearly I never entered a shared key on my ssh client nor at the router/firewall.  Is the router just acting as its own CA?  Is putty or other just sending out some default public key and somewhere along the install created a private key?  It all seems to work as seamlessly as telnet.  But how??  Thanks!
0
Comment
Question by:amigan_99
2 Comments
 
LVL 6

Accepted Solution

by:
nativevlan earned 2000 total points
ID: 36516985
When you enable ssh the router creates the keys and is it's own CA. That's why when you connect via putty and ssh for the first time you will get a warning about the certificate. If you are setting up ssh on a Cisco router or switch the key generation become quite obvious. "crypto key generate rsa general-use"
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 36517004
Thank you.
0

Featured Post

Get your problem seen by more experts

Be seen. Boost your question’s priority for more expert views and faster solutions

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The intent of this article is not to tell you what solution to use (you know it better) or make a big bang change to your current regime (you are well aware of), but to share how the regime can be better and effective in streamlining the multiple pa…
Have a Cisco router that you forgot the password or maybe you bought a used router that is locked with a password? This article will guide you through the steps on how to recover the password on your Cisco gear.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

569 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question