Chapter_16


ssh

Much like RSH (mostly a drop-in replacement). but secure.

rlogin -8 is replaced by ssh -T   (disable tty allocation).
.rhosts authentication is normally DISABLED as is ~/.rhosts

passwordless logins can be enabled by the use of authorized keys...

ssh-keygen  [ -f  keyfile]  -t {rsa | dsa }
creates the keyfile ( $HOME/.ssh/id.rsa or $HOME/.ssh/id.dsa }

keyfile has a correspojnding .pub file..
other people can see the *.puib file ... NOBODY ELSE should be allowed to look at the bare key file...

on the machine you want to login to with the key, append the key.pub file to the $HOME/.ssh/authorized_keys2 file.

If the key file was created without a password (hit ENTER at the pw prompt), then passwdless logins are possible...

amybody who gets hold of the secret key file can login as you.

If you password protect it, they will need both the key file AND the password.

Note: This overrides password protection on many systems.


ssh  <=> rsh
scp <=> scp
sftp <=> ftp