What you have just described is some form of “signed telnet,” not actually SSH.
Ankit Pati
1

Hi Ankit, thank you very much for your feedback.

I completely agree and acknowledge that I left out the initial stage of host verification and establishing a secure channel. It was my thinking that I would focus on explaining at a high-level how private keys and public keys function in general, since this article is geared towards those who are mostly unfamiliar with the main concepts and processes driving SSH. I also wanted to keep the article relatively short and digestible — more of a primer than a complete overview. It was my hope that this article would simply provide a good foundation for others to more thoroughly explore how SSH works on their own.

Based on your feedback, I am considering adding a short section to the end of the article that describes what my article is missing. I might also want to clarify my goal and scope throughout the content.

Thank you again, and please let me know if you have any more feedback or suggestions.

One clap, two clap, three clap, forty?

By clapping more or less, you can signal to us which stories really stand out.