CS 231: Computer Security

SSH Experiments

1. SSH from the user's perspective

2. SSH in the specification

3. Watching SSH with wireshark

4. Putting it all together

Try to create a log of all the steps. There are steps you observe as user, steps seen by the client and server, and steps expected by the RFC. Write your observations down, and don't throw it away--we'll be back here on Wednesday.