1. Home
  2. Technical
  3. SSH / Shell
  4. Zone SSH access policy
  1. Home
  2. Technical
  3. Zone SSH access policy

Zone SSH access policy

Zone hosting platform is using asymmetric encryption (public key cryptosystem) instead of passwords in order to authenticate SSH users. If there’s a wish to use SFTP (not to be confused with FTPS) then that works the exact same way, because it’s still SSH underneath.

The system performs authorization with a key pair, the public key is copied to the virtual server, and the private key remains with the user.
The following cryptographic algorithms are supported using the public key: RSA, EcDSA and Ed25519. Public key must use the OpenSSH-compatible format (e.g. ssh-ed25519 AAAA…).

By default, SSH access is allowed only from IP addresses in the allowed list, but you can opt-out from using this list and let the entire Internet connect via SSH to your server.
The list of allowed IP addresses can also contain blocks of IP addresses described in the CIDR format, which allows using an entire network (or several networks) instead of one IP.

The SSH access log can be viewed via “My Zone” control panel in the SSH section.
You can also find the “fingerprint” of the public key for each of the available algorithms in the SSH control panel.

Updated on 2. Mar 2023
Was this article helpful?

Related Articles