OpenSource For You

This article deals with some of the systems administra­tor’s most familiar tools.

-

OpenSSH was a project started by the OpenBSD team based on the work done by Tatu Ylonen, a Finn, who wrote something called SSH (Secure Shell) back in 1995. It came as a welcome replacemen­t to telnet, which has been a security nightmare for several decades. Today, SSH and its companion, SCm (Secure Copy), can work wonders, not only from a security standpoint, but also from a convenienc­e angle. mlenty of new features are being added with each release to enhance the security with strong crypto, more user convenienc­es like printing the fingerprin­t graphics, and so on. But for the purpose of this article, I will focus only on certain specific use cases. I have found that SSH is an incredibly powerful, versatile and capable tool that lends itself easily to automation and quickly getting a job done. You can even set up remote or local port forwarding, which is normally only done by firewalls.

Let’s look at some of the huge variety of things SSH can do. At the simplest level, it is used for logging into a (usually remote) system with ssh user@host, after which you’re prompted for a password and are logged in. If you set up public key authentica­tion (described below) and load your private key using the ssh-agent daemon, then you can log in without any password—very convenient for non-interactiv­e scripts that run remotely. This works well for SCm too, which uses WhH VDPH nHWwRUN SURWRFRO DV 66H, EXW dRHV fiOH WUDnVIHU LnVWHDd. Another program, SFTm, uses FTm-like semantics, but differs since it uses secure connection­s, has no multiple connection­s like data and command connection­s, or active and passive modes like convention­al FTm. I mostly use only SSH or SCm.

ounning a simple remote command using SSH is easy: ssh foo.bar ls, for example, which connects to the foo.bar PDFhLnH Dnd OLVWV WhH fiOHV Ln WhH dHIDXOW IROdHU. ,I yRX dRn’W supply a username with an @ before the hostname (or with the -l switch), then SSH uses the username under which you are logged in to the local machine. The default folder is then the home folder for that user account on the remote host.

However, for editing and other interactiv­e commands, this approach will not work. For example, you have to run SSH as follows: ssh -t girish@yahoo.com vi /etc/ntp.conf, in which -t switch sets up the terminal mode necessary for working transparen­tly on the network. Once you exit vi, you are back at the local machine prompt, since the SSH session is torn down on completing the editing command.

Newspapers in English

Newspapers from India