The Secure Shell Protocol is a cryptographic network protocol for operating network services securely over an unsecured network.
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
Tatu Ylönen, in 1995 from Finland.
SSH is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
SSH implementation comes with scp utility for remote file transfer that utilises SSH protocol. SSH for file transfer is also utilised by other applications such as sftp and rsync which can make use of SSH to secure its network transaction.
Essentially, SSH keys are an authentication method used to gain access to an encrypted connection between systems and then ultimately use that connection to manage the remote system
ssh -V
ssh-keygen -t rsa -b 4096 -C "mateors github account"
ssh-keygen -t rsa -b 4096 -C "your@email.com"
you may use either email or comment
eval is a built-in Linux command which is used to execute arguments as a shell command.
eval $(ssh-agent -s)
ssh-add -l
ls ~/.ssh
cat ~/.ssh/id_rsa.pub
clip < ~/.ssh/id_rsa.pub
location-> https://github.com/settings/ssh/new
ssh -T git@github.com
ssh-keygen -p
ssh-add -d ~/.ssh/id_rsa
ssh-add -D
Get content of a file from home directory login to remote server create a file and paste its content there
cat ~/file.txt | ssh user@serverip "touch ~/file.txt && cat >> ~/file.txt"
Above technique used to copy public key from local to remote machine
cat ~/.ssh/id_rsa.pub | ssh user@serverip "mkdir -p ~/.ssh && cat >> ~/.ssh/authorized_keys"
The SSH server configuration file is located here: /etc/ssh/sshd_config. An SSH configuration can be validated by running the command:
/usr/ubin/sshd -t
Anytime a change is made to the server’s SSH config file, the SSH service must be restarted.
systemctl status ssh
systemctl restart ssh
systemctl stop ssh
systemctl start ssh
You might also consider add-on solutions to block IP addresses that repeatedly connect but fail to authenticate, such as fail2ban and blacklistd
To some extent, sshd(8) protects itself via privilege separation. Only a small section of the service runs with root privileges. Most of the server runs as an unprivileged user. This means that if an intruder successfully breaks into the server daemon, he can only do a limited amount of damage to your system. It’s still really annoying, but not devastating.
a simple way to reduce risk to your SSH service is to reduce the number of IP addresses that can access it
/etc/hosts.allow
The most effective way to protect your server, however, is to disable passwords and only allow logins via keys.
Reference: