Chapter B. Stupendous OpenSSH Tricks

In This Chapter

  • Interactively connecting to a remote SSH server

  • Installing and starting an OpenSSH server

  • Noninteractively executing commands on remote computers

  • Using OpenSSH port forwarding

  • Using Public/Private Keys

  • Using ssh‐agent

  • Creating an encrypted wireless network using OpenSSH

Secure Shell (SSH) is a set of network protocols that lets you create a secure — encrypted — communication channel between two computers. Tatu Ylonen created SSH in 1995 to replace the nonencrypted communication applications then in use.

SSH creates an encrypted connection between two computers that protects your private communication. SSH enables you to securely communicate with other computers interactively and noninteractively.

OpenSSH is an open source version of the SSH protocol. OpenSSH is an amazing system that at first glance provides a simple and secure method for interacting with other computers. But dig a little under the surface and OpenSSH provides many more capabilities.

The open source OpenSSH suite of security communication tools is compatible with the commercial SSH suite. In this appendix, I say “connect to an SSH server” when describing the process of connecting to either an SSH or OpenSSH server.

This appendix shows you how to configure and use OpenSSH. It also describes how to use some of OpenSSH's lesser‐known capabilities, such as authenticating without passwords and creating an encrypted wireless network using unencrypted access points. OpenSSH is a ...

Get Ubuntu Linux® For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.