<span style="font-family: Arial;">Have you tried RFC4251,52,53?<br><br>-derek<br><br>Sent from my HTC smartphone<br><br>----- Reply message -----<br>From: "Alex Carver" <agcarver+ale@acarver.net><br>To: "Atlanta Linux Enthusiasts" <ale@ale.org><br>Subject: [ale] Documentation of SSH exchange (including math)<br>Date: Sun, Sep 2, 2012 6:10 PM<br><br></span><br>Hi all,<br><br>Does anyone happen to know of a site or other document that describes in <br>detail (including the basic math) of the SSH2 PK authentication process? <br> All my searches describe the process of enabling PK authentication in <br>the daemon and generating the keys but I'm trying to find something that <br>describes the actual exchange process that identifies a user including <br>the math that is used during the exchange (i.e. any intermediate <br>messages being encrypted by which key, etc.)<br><br>I know there is more to the exchange than just the user's private and <br>public keys to reduce the possibility of MITM and replay attacks.<br><br>If I have to I will just dig through the openssh source but I was hoping <br>for something a bit more condensed. I've got a crazy idea for a <br>home-built project (once I scrape together the dollars) and I want to <br>use PK authentication as part of it.<br>_______________________________________________<br>Ale mailing list<br>Ale@ale.org<br>http://mail.ale.org/mailman/listinfo/ale<br>See JOBS, ANNOUNCE and SCHOOLS lists at<br>http://mail.ale.org/mailman/listinfo<br>