The following series of events help protect the integrity of SSH communication between two hosts:
A cryptographic handshake is made so that the client can verify that it is communicating with the correct server.
The transport layer of the connection between the client and remote host is encrypted using a symmetric cipher.
The client authenti...
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.