In This Chapter
Interactively connecting to a remote SSH server
Installing and starting an OpenSSH server
Noninteractively executing commands on remote computers
Using OpenSSH port forwarding
Using Public/Private Keys
Creating an encrypted wireless network using OpenSSH
Secure Shell (SSH) is a set of network protocols that lets you create a secure — encrypted — communication channel between two computers. Tatu Ylonen created SSH in 1995 to replace the nonencrypted communication applications then in use.
SSH creates an encrypted connection between two computers that protects your private communication. SSH enables you to securely communicate with other computers interactively and noninteractively.
OpenSSH is an open source version of the SSH protocol. OpenSSH is an amazing system that at first glance provides a simple and secure method for interacting with other computers. But dig a little under the surface and OpenSSH provides many more capabilities.
The open source OpenSSH suite of security communication tools is compatible with the commercial SSH suite. In this appendix, I say “connect to an SSH server” when describing the process of connecting to either an SSH or OpenSSH server.
This appendix shows you how to configure and use OpenSSH. It also describes how to use some of OpenSSH's lesser‐known capabilities, such as authenticating without passwords and creating an encrypted wireless network using unencrypted access points. OpenSSH is a ...