To reuse an SSH connection, you must generate SSH configuration file. Then, once you make SSH link, Openssh tends to make use of the configuration file to make the link. Obfuscation can help avoid Sybil attacks, where by an adversary produces a number of bogus identities over the community https://speedssh.net/