Chapter_16
ssh
Much like RSH (mostly a drop-in replacement). but secure.
rlogin -8 is replaced by ssh -T (disable tty allocation).
.rhosts authentication is normally DISABLED as is ~/.rhosts
passwordless logins can be enabled by the use of authorized keys...
ssh-keygen [ -f keyfile] -t {rsa | dsa }
creates the keyfile ( $HOME/.ssh/id.rsa or $HOME/.ssh/id.dsa }
keyfile has a correspojnding .pub file..
other people can see the *.puib file ... NOBODY ELSE should be allowed
to look at the bare key file...
on the machine you want to login to with the key, append the key.pub
file to the $HOME/.ssh/authorized_keys2 file.
If the key file was created without a password (hit ENTER at the pw
prompt), then passwdless logins are possible...
amybody who gets hold of the secret
key file can login as you.
If you password protect it, they will need both the key file AND the
password.
Note: This overrides password protection on many systems.
ssh <=> rsh
scp <=> scp
sftp <=> ftp