Chapter 10. Protecting Data in Transit

As illustrated in Chapter 7, "Sniffers and Electronic Eavesdropping," many network services (including but not limited to telnet, ftp, http, rsh, rlogin, and rexec) are vulnerable to electronic eavesdropping. This presents a major problem because even in a closed network environment, at bare minimum you must have secure means of moving files, setting permissions, running shell scripts, and so on.

To guard against attackers capturing your day-to-day network traffic, I highly recommend that you install Secure Shell (ssh). This chapter illustrates how to install and use the ssh server and client utilities.

Secure Shell (ssh)

Secure Shell is a secure login system and suitable replacement for telnet, rlogin, rsh ...

Get Maximum Linux Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.