Regarding this issue found for compliance purposes: Threat:The SSH
protocol (Secure Shell) is a method for secure remote login from one
computer to another.The SSH Server is using a small Public Key.Best
practices require that RSA digital signatures ...