I am a bit confused on how SSH encryption works.
From reading this question, I see you can use a private key to authenticate with the -i
flag.
I also know think that SSH encrypts data using private and public keys.
I am creating an application that will setup and SSH Tunnel and SOCKS5 Proxy for clients. Authentication occurs by using the -i
and specifying an included private key. The idea of this is to ensure that all traffic is encrypted.
I am am afraid that by all clients having the same private key they may be able to decrypt traffic from other clients so my question is the following:
Client A: ssh user@sshtunnel.com -D 5464 -I /path/to/the/private.key -N
Client A: Makes request to http:// unsecured.com with POST data containing Username and Password
Attacker B: Obtains /path/to/the/private.key
In this scenario could Attacker B decrypt the SSH traffic from Client A and view the Username and password in plaintext?