The server is authenticated with a digital signature based on a DSA, RSA or ECDSA
public-key algorithm. At the beginning of the connection, the
server sends its public key to the client for validation.
Copyright 2015 SSH Communications Security Corporation
This software is protected by international copyright laws. All rights reserved. Contact Information