Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Why does SSH work with no PKI and no shared secret?

Posted on 2011-09-10
2
Medium Priority
?
565 Views
Last Modified: 2012-05-12
The theory behind secure protocols is - as I understand it - that they rely on symmetric or asymmetric keys.  Either a shared secret or a private/public key pair.  So a question I've had in the back of my mind for some time is:  How is it I can setup a router or firewall and enable ssh on the device and in the next moment SSH to the device from my workstation?  No Certificate Authority has been setup,  and clearly I never entered a shared key on my ssh client nor at the router/firewall.  Is the router just acting as its own CA?  Is putty or other just sending out some default public key and somewhere along the install created a private key?  It all seems to work as seamlessly as telnet.  But how??  Thanks!
0
Comment
Question by:amigan_99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
nativevlan earned 2000 total points
ID: 36516985
When you enable ssh the router creates the keys and is it's own CA. That's why when you connect via putty and ssh for the first time you will get a warning about the certificate. If you are setting up ssh on a Cisco router or switch the key generation become quite obvious. "crypto key generate rsa general-use"
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 36517004
Thank you.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A new hacking trick has emerged leveraging your own helpdesk or support ticketing tools as an easy way to distribute malware.
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question