SSH Flashcards
What is the purpose of SSH (Secure Shell)?
used to connect the remote server and execute commands remotely on a remote server. remote connection and remote execution.
Which package is required for SSH installation?
rpm -qa | grep openssh* will give
openssh-clients and openssh-server
How can you verify whether the necessary package for SSH is installed on your machine or not?
yum list installed | grep openssh* or rpm -qa | grep openssh*
What is the configuration file for the SSH server?
/etc/ssh/sshd_config
Which configuration file is associated with the SSH client?
/etc/ssh/ssh_config is the
configuration file for the client.
What steps can you take to ensure SSH remains persistent, active, and running?
systemctl enable sshd –now will start and enable sshd service
How would you confirm whether the SSH server's port (sshd) is actively listening or not?
netstat -tunap | grep 22 or netstat -tunap | grep sshd will show listen. lsof -i :22
What method would you use to display a list of all ESTABLISHED connections?
netstat -tunap | grep -i establish
How can you retrieve a list of security logs relevant to SSH?
grep -i sshd
/var/log/secure
How would you list all system logs pertaining to SSH?
grep -i sshd /var/log/messages
Which hidden directory contains files related to SSH authentication for a particular
user?
users home directory has a directory called .ssh
Name the file created during SSH authentication for any server containing fingerprints.
.ssh/known_hosts has the hostname, ip address and fingerprints. Fingerprints are recognition, unique.
How can you establish an SSH connection from server A to server B?
ssh
root@ipaddress or ssh user@ipaddress.
How can you execute a command from server A on server B without switching to
server B?
ssh user@ipaddress “command syntax” for example ssh user@ipaddress “touch file1”
How can we secure the system by disabling direct root logins through SSH?
vi into
/etc/ssh/sshd_config and edit PermitRootLogin from “yes” to “no”.
What are the various tools you have utilized for remote access and data transfer?
scp,
ssh, rsync, ftp/vsftp.
You have received a support ticket indicating that a client is experiencing
unresponsiveness from the server and is unable to establish an SSH connection. How would
you approach troubleshooting this issue?
a. check ssh package – rpm -qa |grep openssh* or yum list installed | grep openssh*.
b. Check service status with systemctl status sshd.
c. Check if port is listening netstat -tunap | grep ssh.
d. Check TCP wrapper in /etc/hosts.deny.
In a scenario with two hosts, A and B, a user requests assistance in setting up
passwordless SSH authentication. Where would the associated keys be stored?
in the users
home directory under .ssh
If an attempt to SSH as the root user with the correct password proves unsuccessful, how would you go about diagnosing and resolving the problem?
check the /etc/ssh/sshd_config file for PermitRootLogin settings and permission.
What is the significance of utilizing SSH key-based authentication?
we can access without password. we can execute commands without password, secure access, do not need to share root password
Could you explain the process of modifying the SSHD port, and outline the steps to
allow this new port through the firewalld?
a. vi and change port in /etc/ssh/sshd_config.
b. Add port number to the firewall, firewall-cmd –add-port=1234/tcp –permanent.
c. firewall-cmd –reload.
d. setenforce 0.
e. systemctl reload/restart service.
In the event that a service (specifically SSHD) fails to initiate, could you enumerate
some of the preliminary troubleshooting measures you might implement?
package, service,
port, tcp wrapper. check credentials for specific user. keys may be expired.
What type of information is typically stored within the known_hosts file?
hostname, ip
address and fingerprints