Remote Management Using SSH
It’s often useful to be able to log in to a machine remotely to perform some management operation. To enable secure remote access, Fedora provides the Secure Shell (SSH).
How Do I Do That?
SSH consists of two components: ssh (the client) and sshd (the server). The server is configured automatically when Fedora is installed.
To connect to a Fedora system from another Fedora system (or another Linux system), run the ssh client, providing the remote username and hostname (or IP address) as a single argument (user
@
host). For example, to log in to a host with the IP address 10.0.0.1 using the user ID jon:
$sshThe authenticity of host '10.0.0.1 (10.0.0.1)' can't be established. RSA key fingerprint is 1d:dd:20:72:b1:0c:28:90:9a:ff:43:69:03:12:71:02. Are you sure you want to continue connecting (yes/no)?jon@10.0.0.1yesWarning: Permanently added '10.0.0.1' (RSA) to the list of known hosts. jon@10.0.0.1's password:Last login: Tue Oct 25 23:13:40 2005 from london-office $AnotherSecret
The question about the authenticity of the remote host will be asked only the first time you connect. The fingerprint value displayed can be used to verify the identify of the remote host and ensure that you’re not being conned by a computer located between you and the computer you’re trying to connect to; if you’re really paranoid, you can check this value, but for most normal applications this isn’t necessary. The fingerprint is cached, though, so if it changes in ...