How security is maintained when you run commands via ssh?

0 like 0 dislike
14 views
Good day colleagues!
We are interested in the following issue.

1) the Generated ssh key
2) Casting it on your target machine (server in my case)
3) Connect to the server
ssh user@host - all good here, no questions
4) run the command
user@host # ls-la

When connecting to the target machine (item 3) validation logic is key to me clear, to access the server we got.

When we try to run the command (principle no matter what, let it be ls-la) (para 4)
are there any additional checks on the server from the security point of view?

Have this crazy theory that every time you run the command the function checks the keys, I think most likely it is not.
Can someone tell me which algorithm you run the command on the remote machine? (Assuming that we are already connected to the server).

It will be enough source where it can be read

Thank you all.
by | 14 views

1 Answer

0 like 0 dislike
When we try to run the command (principle no matter what, let it be ls-la) (para 4)
are there any additional checks on the server from the security point of view?

No. The user accessing the ssh is no different from a normal local user.

Can someone tell me which algorithm you run the command on the remote machine? (Assuming that we are already connected to the server).

Just look in the output of pstree:
├─sshd(700)─┬─sshd(8208)───sshd(8214,jcmvbkbc)───bash(8215)───ssh(8231) │ └─sshd(8232)───sshd(8238,jcmvbkbc)───bash(8239)───pstree(8244)

to understand that after you connect via ssh, sshd (the ssh daemon, the process 8238) launches a login-shell (process 8239), which shows the prompt ($). When it is typed in the command pstree (process 8244), shell simply runs this command.
by

Related questions

0 like 0 dislike
1 answer
0 like 0 dislike
3 answers
0 like 0 dislike
4 answers
0 like 0 dislike
4 answers
110,608 questions
257,186 answers
0 comments
33,717 users