3.ssh
3.ssh
System
Administrator
Accessing Remote
Systems with SSH
What is SSH?
SSH stands for Secure Shell. The
ssh commmand is used to open a
shell on another system in a secure,
encrypted manner. It’s a
replacement, and more secure
version, of the telnet command.
Common ssh Flags
• -l Used to specify an alternate
username. Can also be done
with ssh user@hostname
• -i filename Used for
specifying what private key is
used to authenticate this
connection
• -F filename Used for
specifying what configuration
file to use. The default is:
~/.ssh/config
SSH Private Keys
ssh connections can be made
without sending a password to be
authenticated. This is done with key
pairs. To help get this method set up
there are some utilities already
written.
• ssh-keygen As its name
implies, this script will generate
your keys.
• ssh-copy-id This script will
copy the public key over to the
target server.
X11 Forwarding
ssh will also allow you to tunnel GUI
programs over an SSH connection to be
displayed on your local machine.