

Everything You Need to Know About SSH Keys

SSH keys are part of a protocol that guarantees the protection of IT systems during data transfer between servers and computers and are used by organizations that need to communicate with systems and manage them securely.
However, most companies manage their SSH keys improperly, which puts their security at risk. For this reason, we prepared this article, in which we cover the importance of the SSH protocol, its history, benefits, how it works, and much more. Read it until the end and understand better about this subject.
The use of SSH keys is an extremely important measure for organizations that need to communicate and manage systems securely. Nevertheless, for this procedure to really provide the necessary security, it is essential to adopt good practices.
We start our text by sharing two news stories about breached SSH credentials. The first case took place in 2019, but it was only identified in 2020, and it involves the website host company GoDaddy.
The domain registrar announced it had become the target of a breach that affected the SSH credentials of approximately 28,000 users at the time. A malicious actor would have bypassed its security systems and accessed SSH login data hosted on its servers.
There were no major issues, but its users have been notified about it. In addition, the company reset the usernames and passwords that were exposed and blocked the unauthorized party.
In 2021, GitHub received a warning from developer Axosoft about the vulnerability of a dependency on their git GUI client – GitKraken, which was generating weak keys. Therefore, it revoked all keys generated by vulnerable versions of the client used on GitHub.com.
Other possibly weak keys generated by other clients that could have used the same vulnerable dependency were also revoked. The company still needed to implement safeguards to prevent vulnerable versions of GitKraken from adding weak SSH keys created by older versions.
These two facts demonstrate that large organizations have managed the SSH protocol improperly, creating vulnerability for their systems.
Therefore, we prepared a special content, in which we show you everything you need to know about SSH keys. To facilitate your understanding, we divided our text into the following topics:
- SSH Protocol: What is It and Why is It Important?
- Learn About the History of SSH
- Learn About the Benefits of SSH Key Authentication
- What Are the SSH Key Types?
- Learn How an SSH Key is Generated
- How SSH Key Access Works
- How to Strengthen the Security of SSH Keys
- SSH Key Encryption Categories
- Data Related to the Security of SSH Keys
- Management of SSH Keys by senhasegura
- Conclusion
Follow the whole content!
1. SSH Protocol: What is It and Why is It Important?
Currently used in servers and datacenter environments, SSH consists of a protocol that allows the transmission of data, enabling the encapsulation of applications.
With SSH keys, system administrators and application developers have interactive access to remote systems securely. It is a feature widely used in database updates, backups, automated systems management, and system health monitoring applications.
In practice, SSH keys play a very important role in the functioning of automated digital networks used in data centers and businesses in general.
This solution guarantees encrypted connections with other systems, platforms, and networks that can be distributed in different environments, remote or in the cloud.
SSH keys replace isolated security techniques that are useful for encrypting data transfers. However, this use needs to be properly protected, analyzed periodically, documented, and managed systematically. If this process is not taken seriously, the security of the entire environment is at risk.
2. Learn About the History of SSH
The first version of the SSH protocol was created in the 1990s by the researcher Tatu Ylonen at the University of Helsinki. At the time, a sniffing attack on the university’s network was discovered, capable of intercepting and recording network traffic and revealing usernames and their passwords to malicious actors.
As a result, thousands of credentials were breached. For this reason, the researcher started looking for ways to make networks more secure, developing the SSH protocol.
Currently, SSH keys are used to log in from one system to another remotely. Also, the security provided by encryption makes it possible to perform functions such as: issuing remote commands and managing network infrastructure and other vital system components remotely. Therefore, this tool is essential nowadays, characterized by the trend of remote work.
Before using SSH keys, it is necessary to install some software: while remote systems must necessarily have software called SSH daemon, the system used to issue commands and manage remote servers requires software known as an SSH client. This is the only way to create an appropriate communication channel using the SSH protocol.
3. Learn About the Benefits of SSH Key Authentication
SSH keys have the function of encrypting traffic between server and client. In practice, this means that if someone decides to spy on this traffic, they will not be able to decrypt the data properly.
This solution also provides protection against brute force attacks and attack vectors used to access remote machines. With public-key encryption, there is no need to send passwords over the network, which provides more security.
Another advantage of SSH keys is the possibility of keeping a company in compliance with security regulations, but for this, it is necessary to generate, store, manage, and remove them following certain guidelines that guarantee the necessary protection.
There is a massive amount of SSH keys that can be used at any time by an organization. Therefore, it is recommended to use software to manage them and reduce risks.
4. What Are the SSH Key Types?
SSH keys provide security and cost savings to cloud and other computer-dependent services if managed properly.
This feature has a similar function to that of passwords, since they grant access, controlling who will access the system. To perform this management, it is necessary to adopt security policies, as it must be done with user accounts and passwords.
We also emphasize it is the control of SSH keys that provides continuous availability, confidentiality, and integrity to the systems, as long as public-key encryption is used.
These keys are categorized according to their function as: user keys, host keys, and session keys. Check it out:
- User Keys
Here, we are talking about authorized and identity keys, used to grant login access to users. Its authentication mechanism is known as public-key authentication.
These identity keys are used by SSH clients to allow users to authenticate when logging into SSH servers.
- Host Keys
This type of key is intended to authenticate computers, preventing man-in-the-middle attacks. This authentication is certificate-based and can be very useful for organizations.
These authentication keys must secure all connections, and one of the characteristics of SSH is to remember the host’s key when connecting to it for the first time.
- Session Keys
Session keys have the function of encrypting most data on a connection. This key is negotiated during connection initialization. It is then used with symmetric encryption algorithm and an authentication code algorithm that ensure data protection.
5. Learn How an SSH Key is Generated
They are generated in pairs that bring together a “public” and a “private” SSH key. In this process, complex algorithms are used, so that it is unlikely to falsify or identify the private key, even if the public key is known.
Thus, one must keep the private key secret, being used only by an authorized user. Public keys can be shared with others.
To generate SSH keys, one needs to enter information such as passwords. Generally, short phrases are used to generate public and private keys.
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.


Luck o’ the Edge Trial

As the old Irish saying goes, the luck is in believing you’re lucky. But you don’t need luck with Scale Computing…you just need edge computing. With edge computing, you can run applications and process data outside centralized data centers, at the edge of your network closest to where that data is created and utilized. Centrally monitor and manage hundreds or thousands of distributed edge infrastructure deployments with few or no on-site IT personnel.
The award winning Scale Computing HC3 Edge series brings on-premises edge computing with high availability and disaster recovery to remote locations at an affordable entry level cost. All edge models can be deployed quickly, managed locally or remotely, and can self-heal almost instantly. Enjoy affordable edge computing infrastructure that is reliable, easy to deploy, and easy to use.
Take advantage today of Scale Computing’s HC3 Edge Computing Trial, a no cost program for qualified customers to try the Scale Computing HE150 edge computing platform. Built specifically for multi-site deployments that need highly available infrastructure on-premises, with remote management, the HE150 can be deployed almost anywhere, without requiring a rack or server closet. Get hands-on experience with self-healing, right-sized infrastructure that runs critical applications right where they’re needed.
Scale Computing joined forces with select reseller partners from the award-winning Scale Computing Partner Community to offer this innovative, right-sized, all-flash, NVMe storage-based compute appliance that delivers all of the simplicity, efficiency, and enterprise-ready virtualization associated with Scale Computing’s HC3 platform. Built specifically for multi-site deployments that need highly available infrastructure on-premises and remote management, the HE150 can be deployed almost anywhere, without requiring a rack or server closet. Taking up only the space needed to stack three smartphones, it also includes disaster recovery, high availability clustering, rolling upgrades and integrated data protection.
Details of the Edge Trial include:
- HC3 self-healing technology that keeps applications running
- Simplified deployment and management
- Minimal training, with no onsite IT expertise needed
- Do more with less hardware costs and fewer resources
- Single vendor support experience
- Available as a 3+ node cluster or 1 node platform
- Qualification criteria required (10+ locations)
- The trial offer is only valid in North America, United Kingdom, Benelux, Germany, France, Switzerland, Austria and South Africa
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.





