13,420
edits
Changes
no edit summary
::While it doesn't mean the message is <u>secure</u> as anybody could decrypt it with the public key, it does establish my <u>identity</u>, if the host can successfully decrypt the message then it must have come from the one person in possession of the private key.
::We are now going to generate a new set of public/private keys.Students run into a lot of trouble when using ssh and generating key-pairs by performing these operations as root user by Mistake! Make <u>certain</u> that you are NOT logged in as root!''' (you have been warned!)
<ol>