The operation of this protocol can be summarized in the following steps:
- The client initiates a TCP connection on port 22 of the service. This port is the one that uses the protocol by default, although as we will see in the following steps, it can be modified.
- The client and the server agree on the version of the protocol to be used, as well as the encryption algorithm used for the exchange of information.
- The server, which has two keys (one private and one public), sends its public key to the client.
- When the client receives the key sent by the server, it compares it with the one stored to verify its authenticity. The SSH protocol requires the client to confirm it the first time.
- With the public key of the ...