Help  |   Contact Us  |   About Us  |   News and Events
Books, conferences, and other information about... Moving to Linux Switching to OOo Building Linux Apps Using Visual FoxPro
Buy      Download      Your Account      Catalog      Support      Conferences      Resources      Fun

SSH: Using and Securing


Click HERE to download the PDF.

by Whil Hentzen
Length: 20 pgs
Formats Available: PDF
Press date: 2004/8/19
  Updated 2006/1/14
  Updated, renamed 2007/8/14
Source code: N/A

Back to whitepaper list

Abstract

SSH is one of those typical 'Linux mysteries' for the uninitiated. SSH provides a secure mechanism to connect to another machine over a network. This allows you to control a remote computer (such as through the command window) over the Internet without exposing your connection to other people. Here's what SSH does, why you'd use it, how it works, how to use it, and how to secure it.


Table of Contents

1. Preface
1.1. Copyright
1.2. Revisions
1.2.1. History
1.2.2. New version
1.2.3. Feedback and corrections
1.3. References and acknowledgments
1.4. Disclaimer
1.5. Prerequisites

2. SSH definition - what is it and what does it do?

3. The configuration used for this discussion

4. Using SSH via Passwords
4.1 Configuring the server
4.2 Using the client to connect to the server
4.3 Matching accounts
4.4 Shutting down

5. Using SSH
5.1 Become root on the remote machine
5.2 Logging in as a different account
5.3 Testing SSH on a single machine
5.4 Restarting SSH remotely
5.5 Using csp (secure copy)
5.6 Using graphical tools on the remote box

6. Securing SSH
6.1 Restricting root logins
6.2 Changing the SSH port
6.3 Changing the port for easier external access
6.4 Restricting via the Firewall
6.5 Restricting via host.allow and host.deny

6.6. Using SSH via Public Key Authentication
6.6.1 How public/private keys work
6.6.1.1 An amateur's discussion of public and private keys
6.6.2 To implement public key authentication
6.6.2.1 Configuring the server
6.6.2.2 Create the public and private keys on the client
6.6.2.3 Put the public key on the server
6.6.2.4 Using the client to connect to the server
6.6.2.5 Adding your passphrase to your ssh-agent key ring
6.6.2.6 Using a private key on a separate device

7. Where to go for more information


Help  |   Contact Us  |   Legal  |   Privacy  |   Copyright  |   Join Our Mailing List