SSH connectivity overview
- client requests an SSH session with server
- SSH Protocol sessions are exchanged, if they are compatible - they agree, otherwise - no connection
- Key Exchange information is shared with the cryptographic primitives that each side supports
- Both client and server negociate session key using Diffie-Helman algorithm, creating a symmetric key. At this point, if the server is not known to the client, you will see the request to add the key fingerprint to the clients known_hosts file
- New keys between client and server are established. Future communication uses these keys
- Encrypted session established, ready for authentication