On Fri, Apr 28, 2000 at 05:03:44PM -0400, asosin wrote:
> Can anyone explain in general how the SSH2 authentication between the
> Server and Client works, thus prior to the user entering their password and
> without using ".rhosts or RSA user authentication" ?
in SSH2 the server signs (currently with DSS/DSA) a value derived
from a shared Diffie-Hellman secret, two random cookies and some
more data. the client has to verify the sigature.
> (How is this authentication better then SSH1 ?)
in SSH1 the server sends his RSA host key and a temporary RSA
(server) key to the client. the client verifies the host key
(~/.ssh/known_hosts), generates a random session key, encrypts a
value derived from this session key with the 2 RSA keys and sends
this to the server. server authentication fails if the server cannot
decrypt the secret.
one 'advantage' of SSH2 is that it is not restricted to RSA, thus
there are no problems with the RSA patent.
but this advantage will expire this year on September 20th, the very
day the RSA patent expires.
>
> If anyone knows a URL, that will suffice.
search the web for draft-ietf-secsh-transport-06.txt