|

Click HERE to download the PDF.
by Whil Hentzen
Length: 15 pgs
Formats Available: PDF
Press date: 2004/8/19
Updated 2006/1/14
Source code: N/A
Back to whitepaper list
|
|
Abstract
SSH is one of those typical "Linux mysteries" for the uninitiated.
Here's what SSH does, why you'd use it, how it works and, most importantly, how to use it.
Table of Contents
1. Preface
1.1. Copyright
1.2. Revisions
1.2.1. History
1.2.2. New version
1.2.3. Feedback and corrections
1.3. References and acknowledgments
1.4. Disclaimer
1.5. Prerequisites
2. SSH definition - what is it and what does it do?
3. The configuration used for this discussion
4. Using SSH via Passwords
4.1 Configuring the server
4.2 Using the client to connect to the server
5. Using SSH via Public Key Authentication
5.1 How public/private keys work
5.1.1 An amateur's discussion of public and private keys
5.2 To implement
5.2.1 Configuring the server
5.2.2 Create the public and private keys
5.2.3 Using the client to connect to the server
5.2.4 Adding your passphrase to your ssh-agent key ring
5.2.5 Using a private key on a separate device
6. Advanced functions
6.1 Become root on the remote machine
6.2 Logging in as a different account
6.3 Testing SSH on a single machine
6.4 Restarting SSH remotely
6.5 Using csp (secure copy)
7. Where to go for more information
|