SSH basics Flashcards
SSH is a technology for connecting to a remote server and accessing a command line on that server, often in order to ad____ it.
SSH is a technology for connecting to a remote server and accessing a command line on that server, often in order to administer it.
SSH is usually used to access servers running U___-like operating systems, but your own computer doesn’t have to be running U___ in order to use SSH
SSH is usually used to access servers running Unix-like operating systems, but your own computer doesn’t have to be running Unix in order to use SSH
SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your local terminal are sent to the r____ s_____ and executed there.
SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your local terminal are sent to the remote server and executed there.
When you connect through SSH, you log in using an account that exists on the r____ s_____.
When you connect through SSH, you log in using an account that exists on the remote server.
When you connect through SSH, you will be dropped into a s___ session, which is a text-based interface where you can interact with your server.
When you connect through SSH, you will be dropped into a shell session, which is a text-based interface where you can interact with your server.
For the duration of your SSH session, any commands that you type into your local terminal are sent through an encrypted SSH t____ and executed on your server.
For the duration of your SSH session, any commands that you type into your local terminal are sent through an encrypted SSH tunnel and executed on your server.
For an SSH connection to be established, the remote machine must be running a piece of software called an SSH d_____
For an SSH connection to be established, the remote machine must be running a piece of software called an SSH daemon
SSH keys are a matching set of c________ic keys which can be used for authentication
SSH keys are a matching set of cryptographic keys which can be used for authentication
SSH keys are 2048 b__s by default. This is generally considered to be good enough for security, but you can specify a greater number of b__s for a more hardened key.
SSH keys are 2048 bits by default. This is generally considered to be good enough for security, but you can specify a greater number of bits for a more hardened key.
To find out the fingerprint of an SSH key, type:
ssh-keygen -l
To connect to a remote server and open a shell session there, you can use the s__ command.
To connect to a remote server and open a shell session there, you can use the ssh command.
ssh remote_host
By default the SSH daemon on a server runs on port __
By default the SSH daemon on a server runs on port 22
you will have to specify the new port number when connecting with your client, which you can do with the -_ option
-p option to specify port
you can create or edit a configuration file in the ~/.ssh directory within the home directory of your local computer.
Edit or create the file now by typing:
nano ~/.ssh/config
OR
vim ~/.ssh/config
to completely disable root login through SSH after you have set up an SSH user account that has sudo privileges, open the SSH daemon configuration file with root or sudo on your remote server do the following 3 things:
1)
sudo nano /etc/ssh/sshd_config
OR
sudo vim /etc/ssh/sshd_config
2)
PermitRootLogin no
To implement your changes, restart the SSH daemon
3)
sudo service ssh restart