[2024-feb-29] Sad news: Eric Layton aka Nocturnal Slacker aka vtel57 passed away on Feb 26th, shortly after hospitalization. He was one of our Wiki's most prominent admins. He will be missed.
Diferencias
Muestra las diferencias entre dos versiones de la página.
Próxima revisión | Revisión previaPróxima revisiónAmbos lados, revisión siguiente | ||
es:howtos:security:sshkeys [2019/02/11 01:45 (UTC)] – creado slackwarespanol | es:howtos:security:sshkeys [2019/06/15 01:52 (UTC)] – antares_alf | ||
---|---|---|---|
Línea 1: | Línea 1: | ||
<!-- Add your text below. We strongly advise to start with a Headline (see button bar above). --> | <!-- Add your text below. We strongly advise to start with a Headline (see button bar above). --> | ||
- | ====== | + | ====== |
- | [[http:// | + | [[http:// |
- | The concept of public/private keys can be hard to explain, we will try to go through it in as simple | + | El concepto de claves públicas/privadas puede ser difícil de explicar, trataremos de hacerlo de la manera más simple |
+ | < | ||
- | < | + | Esencialmente, las llaves |
- | Essentially, | + | Hasta ahora todo bien ... Ahora, ¿cómo se usa esto con SSH? |
- | So far so good... Now, how is this used with SSH? | + | Cada vez que se comunique con una máquina Slackware (o cualquier máquina que ejecute OpenSSH, en realidad) a través del protocolo |
- | Whenever you contact a Slackware machine | + | Luego, intentarán determinar cómo usted (el usuario) iniciará sesión en la máquina remota. Si no se usan las claves, usualmente |
Then, they will try to determine how you (the user) will login on the remote machine. If keys are not used, SSH will usually (but not always) default to asking you a password. On the other hand, if keys are used, the machines are going to use them in the following order: | Then, they will try to determine how you (the user) will login on the remote machine. If keys are not used, SSH will usually (but not always) default to asking you a password. On the other hand, if keys are used, the machines are going to use them in the following order: | ||
- | - The SSH server will encrypt a short message | + | - El servidor |
- | - Your SSH client will decrypt this message with the private key (whose only copy should be on your computer), and send it back to the SSH server. | + | - Su cliente de SSH descifrará este mensaje con la clave privada |
- | - The SSH server will then be satisfied that you "are you" so to speak, since you are theoretically the only person able to decrypt the message sent, and will grant you access immediately. | + | - El servidor de SSH estará satisfecho de que usted 'sea usted', por así decirlo, ya que teóricamente es la única persona capaz de descifrar el mensaje enviado y le otorgará acceso de inmediato. |
+ | Si todo esto parece un poco complicado, solo recuerda esto: tienes una clave pública y una privada. La clave pública debe estar en la computadora a la que desea acceder, o la computadora ' | ||
- | If this all seems a bit complicated, | + | ¡Vamos |
- | Let's go through this process step by step! | ||