We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

What is SSH? Essay Sample

essay
The whole doc is available only for registered users OPEN DOC

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

What is SSH? Essay Sample

SSH is a Secure Shell that uses a secure encrypted communication protocol designed to replace older insecure protocols like telnet, rsh, and ftp. SSH authentication is done with a username and password combination, which is the default. This is the most simplistic usage we will see. $ ssh [email protected]

SSH comes with all Linux distributions as well as other Unix variants. SSH is not a complete security solution and it will not protect against trojans, viruses, etc. Why would you want to replace telnet and remote login with SSH? SSH (Secure Shell) is a protocol that can be used to log into a remote machine and provide secure encrypted communications between the Virtual Server and the local computer. The communication is made via encrypted channels. Telnet on the other hand communicates without any encryption, allowing a sniffer to capture information, e.g. user names and passwords. This is why SSH is preferred over Telnet.

SSH uses a public and private key on each system. The private key is the one which you should never give away access to and the public key is the one which you will put on other machines you want to log into. For any given public key, only one possible private key can be its’ other half. The first time a user uses SSH to connect to a remote system, their SSH client program exchanges the public keys, unless keys have been exchanged manually. If keys are exchanged over the network during the first connection, the user essentially trusts the security of the network during the key exchange. On subsequent connections to the same system, the SSH program will check that the keys haven’t changed to ensure that it is still the same system. This is an example of a Telnet unencrypted client-server session:

This is an example of an encrypted SSH client-server session:

How is SSH configured on a Linux computer?

To configure SSH on a Linux computer you need to open ssh server to install it to first work on SSH. Please note that the installation process may be different for different distributions. Open terminal and become root by: su –

For Debian based distributions like Ubuntu/Debian: apt-get install openssh-server For RPM based distributions like openSUSE: zipper install openssh-server Now you need to start the SSH server: /etc/init.d/ssh start

The above command also needs root privileges to run it after installation of the SSH server. Now we need to perform some security measures to avoid security risks. To do those go to sshd-config file and edit these things: Vim/etc/ssh/sshd-configure

Some things need to be changed for security reasons:
Search for ‘PermitRootLogin’ without quotes and changes yes to no like this: From,
PermitRootLogin yes
To,
PermitRootLogin no

This is because we don’t need root user to access the server and most of the attackers use root as userid to hack the server. By adding this to the security measures, you shut down another way for the attackers to get access to your system.

Now you should change the port from the default of 22 to a higher number. This can be anything you have in mind but it should not be easy to guess. Search for the ‘Port’ keyword and change the number to any number like 5,000, which is the maximum number. There are a lot of people who will sniff for the default ports in the lower range and then will try different algorithms to log in using lists of different user names.

For port changing you will need to make some changes in the router to allow different ports access from external connections to your server. Sometimes it needs to be changed and sometimes it doesn’t, it just depends on how your router is configured.

For the last and more important one, search for this word at the end of the file ‘AllowUsers’ without the quotes. If this is not there you can add it to the end of the file. AllowUsers jelly bobwill arif

In the above line, three users will be able to access the machine; you can add more users if you need to by separating each name with a space. This will provide more security to just check for the user names specified here, other user names will be ignored including root.

Although there are more security measures, these will make sure that your server is safe from attackers so they cannot get access to it.
Now it is time to restart the SSH server. To do this enter the following command: /etc/init.d/ssh restart

If you want to stop the server, the command is:
/etc/init.d/ssh stop
The installation and configuration of SSH is now complete. You should now be able to login to your server through SSH from remote machines.

References
Krenz, M. (2006). SSH Tutorial for Linux. Retrieved February 28, 2013 from http://support.suso.com/supki/SSH_Tutorial_for_Linux

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

12 Angry Men: Communication Styles

The start of the film introduces us to the foreman, who in this situation, acts as the leader and/or ‘boss’. Although everyone are equal, it becomes clear throughout the film just how much he developed into becoming a respected authority in his position. Communication plays a very important role for the success in any area of life, but especially so in a professional setting such...

Effective communication and interpersonal interaction

INTRODUCATION The purpose of this essay is to explain the importance of effective communication and interpersonal interaction how it can be practice in the care settings. Also, concept of how effective communication can be use by service providers or care managers before setting out policies so that staff will be able to communicate efficiently with each other which is very important when dealing with service...

Different communication theories

This assignment will cover different communication theories and how they are relevant and the skills that are used in health and social care organization. These theories are humanistic, behaviorist, cognitive development and psychoanalytic. Humanistic theory is set to understand human nature and condition, this theory is applied in counseling individual. Behaviourist theory, cognitive and psychoanalytic can be used by health practitioners when communicating with service...

Effective Communication and Information Sharing

4a.1 Explain the reasons why people communicate As a carer- communication is vital. We use communication to understand what others needs are and to express our own needs. We use communication to share information or to receive direction. To share knowledge We need communication to build relationships and maintain them. To express our feelings and to understand how others are feeling. To express a preference and offer...

Sonnet on the Death of Mr. Richard...

The poem “Sonnet on the Death of Mr. Richard West” which was written by Thomas Gray deals with a loss and the aftereffect it has on those left behind. The communicative situation such as the deictics of the poem can be detected by looking at the first person pronouns being ‘me’ (l.1), ‘my’ and ‘mine’ (l.7) as well as ‘I’ (l.13;14) suggesting that there is a...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Couldn't Find What You Looking For?

Get access to our huge knowledge base which is continuously updated

Next Update Will Be About:
14 : 59 : 59
Become a Member