Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

Chapter 9: Linux SSH > Solutions Fast Track - Pg. 211

LinuxSSH·Chapter9 211 Summary In this chapter we've explored how to install SSH, how to configure it, and how to use it. In most Linux distributions, OpenSSH is a package that is easy to install. Installing from source is more complicated and requires specific instructions for each package or distribution, but it allows us a bit more freedom to pick and choose what our server is able to do. In the configuration section, we went over some of the settings that can be used to help keep our SSH server as secure as possible. These methods can include restricting access from anyone not on the local network, limiting the protocols used to connect, and binding the service to a non-standard port. All of these various methods limit the attack surface that our server presents. Some of the options that we discussed are dependent on having the correct packages installed or the binaries compiled with those features in mind. In the final section, we looked at some of the administration activities that you can do using SSH. Some of the more simple features like secure logins can build up to more advanced features, like running scripts with ssh commands inside them. There are many advanced features that require complex setups, but each person is going to have a different list of features and tasks that he or she wants to perform. There are many people out there that make a living and take pleasure from attacking and cracking computer systems. Using tools like SSH can help us minimize the threat that people like that present. While security features like encryption and strong authentication are important, it is imperative that we keep up a vigilant front. Having the best software in the world won't help if we