Popular interview question: what happens when you type “ssh hostname”?

Hemant Jain
1 min readApr 13, 2023

--

In the 1990s, Secure Shell was developed to provide a secure alternative to Telnet for remote system access and management. Using SSH is a great way to set up secure communication between client and server because it uses a secure protocol.

Source: https://bytebytego.com

The following happens when you type “ssh hostname”:
🔹 Hostname resolution: Convert the hostname to an IP address using DNS or the local hosts file.
🔹 SSH client initialization: Connect to the remote SSH server.
🔹 TCP handshake: Establish a reliable connection.
🔹 Protocol negotiation: Agree on the SSH protocol version and encryption algorithms.
🔹 Key exchange: Generate a shared secret key securely.
🔹 Server authentication: Verify the server’s public key.
🔹 User authentication: Authenticate using a password, public key, or another method.
🔹 Session establishment: Create an encrypted SSH session and access the remote system.

Make sure you always use key-based authentication with SSH for better security, and learn SSH configuration files and options to customize your experience. Keep up with best practices and security recommendations to ensure a secure and efficient remote access experience.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Hemant Jain
Hemant Jain

Written by Hemant Jain

Sr. SRE at Oracle, Ex-PayPal, Ex-RedHat. Professional Graduate Student interested in Cloud Computing and Advanced Big Data Processing and Optimization.

No responses yet

Write a response