Introducing OpenSSH

Introducing OpenSSH
binhnx2000

INTRODUCE
OpenSSH
is an open source program used to encrypt transactions between hosts using Secure Shell (SSH). It is a safe alternative to the programs that are used to connect such as: Telnet, rlogin, rsh ... because it always encrypts all transactions, hides, hides the username and The password is used for remote login sessions. After the login session is executed, it will continue to encrypt all transaction data between the two hosts

The OpenSSH project was developed on the basis of the project Open BSD (a Unix family OS). It is designed to use powerful encryption algorithms to improve security and prevent hacker attacks. Although built and developed by the OpenBSD platform, it is also compatible and can work on most Unix-based systems. Linux, HP-UX, AIX, Irix, SCO, MacOS X, Cygwin, Digital Unix / Tru64 / OSF, SNI / Reliant Unix, NeXT, Solaris ...

OpenSSH is not a program. It is a set of secure connection programs:

OpenSSH Client (ssh) : The program is used for remote login. With safety and encrypt (encrypt) in each login session at a high level. It is a safe alternative to: rlogin and telnet have been outdated and less secure.
Secure Copy Program (scp) Used for remote file copying, copying files from different hosts on the Internet. It supports username and password.
Secure File Transfer Program (sftp) It is used to recover FTP requests securely.
OpenSSH Deadmon (shhd) : Set OpenSSH to run in daemon mode on Unix systems.
................

These are the main tools that are indispensable in OpenSSH. There are also a lot of Tools, Plugins, Addin ...

INSTALLATION

To get OpenSSH on its main website: http: // www.opens sh.org

Download a version that fits your system. I use Linux so I will download the 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com .rpm package. Then use the command

root@domain.com#: rpm -Uvh 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com .rpm

If you use other systems then the installation is the same. You download the package that fits your system. It can be 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com .tar, 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com .tar.gz, 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com .gz ... etc. Extract it into a folder.

root@domain.com # ./configure
root@domain.com #: make
root@domain.com # make install

Follow the script instructions. Installation work is not difficult. Let's spend some time and effort on configuration work.

OPTIONS OF OPEN SSH

Open SSH provides quite a few features to keep the communication between two hosts up and secure. Here are some highlights:

1) Strong encryption capability by using 3 DES encryption and Blowfish encryption Both coding standards are free and widely used in many countries around the world. 3DES provides the ability to encrypt time stamps. Blowfish provides faster coding. Just as the other coding standards provide the ability to encrypt data before it is safely transmitted.
Strong authentication through the use of Public Key, OPTs (One Time Password), Kerberos There are four methods of authentication used by Open SSH:
Public Key authentication only
Host authentication by using Public Key in conjunction with .rhost
The authentication is based on OPTs associated with s / key
Authentication is based on the Kerberos mechanism
3) Encrypts the X11 protocol for X Window usage : Encrypt data during X Window usage between two hosts. Used to fight off remote attacks aimed at xterm like Snooping, Hjacking ...
4) Port forwarding encryption. Allows the process of converting TCP / IP ports to another system through an encrypted channel. It is used for standard Internet protocols that do not provide the ability to encrypt data on the network such as SMTP, POP, FTP, Telnet ...
5) Forwarding agent for logon to single networks A user's authentication key can and is usually stored on their PC, which can become a validation agent. When the system users access from another network. Their connection will be forwarded to this authentication station. It allows users to access your system safely from any system.
Data Compression : Provides the ability to compress data safely. It is very meaningful on fast networks.
7) General authentication for Kerberos and Andrew File System using Ticket Kerberos and AFS users will be provided with a generic password to use and access the two services for a specified period of time.

OPEN SSH OPERATION GUIDELINES

We first learn about authentication mechanisms for r 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com (rlogin, rsh, rcp) commands. When using rlogin The first condition is that the user must have an account on the system that they want to remotely login to. For example, the remote system has an account binhnx2000 . If from a local system I connect to a remote system, there will not be any password prompts when I log into this remote system. Simply by account binhnx2000 My file has been validated .rhost ksear to ks / home / binhnx2000 on the remote system.

File .rhost Contains the hostname and username required for the account needed to use the login to the system. For example, my hostname is vnzone.net and my username is binhnx2000 . To access the system without Passowd, the information about me in the file .rhost It looks like this:

Hostname Username

For hostname must be the full hostname of the system. The username must be a valid username on the system you want to login to.

A concrete example: if I want to use rlogin. The admin must create a file .rhost in / home / binhnx2000 with content:

domain.com binhnx2000

All done! Now when I want to log into the system I just issue the command:

The limitation of this protocol is that the data that travels to the host is not encrypted. It can be sniffed by sniffer programs. Especially very vulnerable by the attacks: IP Spoof, DNS Spoof, Router Spoof ...

Because of the vulnerability, security experts recommend that you disable the r 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com service (rlogin, rsh ...) on the system. Normally, on Linux systems, the overall configuration works in common for services that are configured in the file /etc/xinet.d , to disable the r 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com service:

You use vi, emacs ... or any text editor you want to open /etc/init.d/xinet.d
Find the " service login "Delete them. Record any changes and exit the editor.
Restart xinetd.d daemon /etc/init.d/xinet.d restart
If possible, disable the telnet service always. Then replace them with Open SSH.

We have learned the r 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe?p=1 des.txt en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label:Some Text link_original.txt link.txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02.html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com service principle. Now, let's take a look at the OpenSSH operating principles. The first thing I can say to you is: Open SSH provides a fairly secure authentication mechanism by using the Public Key Private Key The Private Key Only used by the owner, also Public Key may & nbsp; used by people.

Want Open SSH created DSA Private / Public Key You use:

shh-keygen -d

The DSA Private Key Usually stored at $ HOME / .ssh / id_dsa file. Still the DSA Public Key Usually stored at $ HOME / .ssh / id_dsa.pub ... the Public Key need to be renamed and copied to the appropriate directory on the remote system want to use Open SSH.

Listed below also the location Public Key but Open SSH used in the authentication process:

SSH Version 2 Keys

Local System Default Location

Remote Host Location

Private Key

$ HOME / .ssh / id_dsa

Public Key

$ HOME / .ssh / id_dsa.pub

$ HOME / .ssh / authorized_keys2

SSH Version 1 Key

Local System Default Location

Remote Host Location

Private Key

$ HOME / .ssh / identity

Public Key

$ HOME / .ssh / identity.pub

$ HOME / .ssh / authorized_keys

Here are some important files that Open SSH uses to identify public keys:

$ HOME / .ssh / known_hosts List of Public Keys for all hosts with user login. Often the list of Public Key hosts is listed at / etc / ssh_known_hosts
/ etc / ssh_known_hosts : Contains the list RSA Generated Public Key For all hosts that the system is aware of. Any host that wants to log on to the system must have Public Key listed in this file. Admin on your system need to list the Public Key of the users in that network
/ etc / ssh_known_hosts2 : As ssh_know_host it contains the list DSA Generated Public Key For all hosts that the system knows.
$ HOME / .ssh / config : Configuration file for each user. In some large systems, each user will have a special configuration file. It will be used by the SSH Client.
/ etc / ssh / ssh_config : Configuration file for the whole system. It can also be used for users who do not have a configuration file or have no configuration files yet. It is automatically initialized when the initial SSH is installed and called for use every time Open SSH daemon running.
$ HOME / .ssh / rc List the commands executed during the user logon process, which are executed before the user's shell is opened.
/ etc / sshrc : Similar to / .ssh / rc It is used on large systems.

USE OPEN SSH TO ENSURE DATA SAFETY ON A SAFETY NETWORK

Before use Open SSH Make sure your local system and remote system are installed Open SSH.
Order ssh-keygen Used to create and manage the authentication SSH Key . To use Open SSH First of all you have to create the or RSA Private Key, Public Key Next you follow the instructions below. I use the system myself Debian Linux v 2.5.2

First, create a user on the system

root@domain.com# : useradd binhnx2000

Do not forget to set a password for this user

root@domain.com# : passwd binhnx2000
Changing the password for user binhnx2000
New UNIX password: 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe? P = 1 en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label: Some Text link_original.txt link. txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02. html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com
Retype new UNIX password: 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-list? P = 1 en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label: Some Text link_original.txt link .txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02 .html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable. com www.microsoft.com
passwd: all authentication tokens được cập nhật thành công

Log in to the account binhnx2000 that I just created:
Now I will continue to create Private Keys and Public Keys.

Note : From Open SSH v 2.0 The next time you request to create a new Key. By default it will give you the RSA Key. If you want to create a DSA Key, you must use the -d option

binhnx2000@domain.com$ : ssh-keygen -d
Generating DSA parameter and key.
Nhập tập tin đó đó để lưu key (/home/binhnx2000/.ssh/id_dsa):

Press Enter if you want to save the Key to its default directory:
Created directory '/home/binhnx2000/.ssh'.
Enter passphrase (empty for no passphrase):

You enter passphrase (This is a password that will be encrypted using the 3 DES algorithm to control the Private Key.)

Note pasphrase unrecoverable. If you forget, you will have to create and redistribute the Key. This is very annoying.

Press Enter when everything is done.

Your reference was saved in /home/binhnx2000/.ssh/id_dsa.
Your public key has been saved in /home/binhnx2000/.ssh/id_dsa.pub.
The key fingerprint is:
ca: 3b: f9: 80: 5a: 91: e5: c1: 1e: 5b: 30: 02: 2f: d5: 53: 13
binhnx2000@domain.com

Take a look at the Private Key content you will see:

----- BEGIN DSA PRIVATE KEY -----

Proc-Type: 4, ENCRYPTED

DESK-Info: DES-EDE3-CBC, D40D902FF5666C7B

DlyufhXG5shn / JblF4iY67nMAHG5AUtBvpdBZKiMnq6bKLPQ5nFmDBVxZ9jb86BT

p / XL6IoJOeyeHDf3txtCkFymujibeO203uMwQ / yvH1VrENkywj1uglAYBxF5FdPt

44Y5Mab04tQPVKLd1Jgxs / O / 23bghYNJyCw9j9uP / G / 6dkrYB5EAMZ / HnD6OG0 / 5

UPSrOTLwxfIOq7RbJGthgejosVvSFCEfNOu1OyhTF0FqM9po6uGbzVra36Lk13M +

.

4TjsuSKuE4oNLnr6Kx5dcg6ZedHRx + ggaSRZ + 4VTP43RgEj0CsqY9wB8kN1wXEWM

z7oj4o8EtrN4xFcT3C9Jl2sd + nJA085wFCFktdtI6zN7i6gMXMhTvTi / w / gPF + vM

4pAzP9Z5NHN5v8 / UHBmkytwx4f5uofYovM8hHQzUZGs / 3yEsUPBrxCQgW / MMC5jd

XyZyF0ryleid62feGNbbvgLEIZMZvNSCmJpYgD60CFskBemg / 02htaIVwdlg85lW

JoZuLBBKpkRb4UXNb0IRG2NvtZKQ8h98

----- END DSA PRIVATE KEY -----

This is the content of Public Key:

ssh-dss AAAAB3NzaC1kc3MAAACBAL4qF1YLu6l / zhhmgBJfFOgAqc635u / DRes / bXiSrCbuV1
Rey5nZb2AA8rdExtremeMyMdreCD34HRCVSblirirhSZ3r9qld1fipT6NPsOr + AMct13oPirlWAF0
J
CTQ5bmP7ztr1LME / UjMQAAAIEAlyiJs4CazMnGB6mguefOZHI1BJPmPdOZeee9cvFRSQ1
nDoLK6ScxPpclQu0uwh8CEFuIjl / oMBf1rIHwONC7kxIIY6U82B3cZcBOL7SXt2wnPg8mg4I7
quq2Mq23lWsPeAH3ElfijOr15rgb4PQPV1bYoNlQPmb3zb6n4uoe3WQAAACBAKiamld09b
mHk3GCqn40u1WKtMLzpwowCtv24VZ / v4yQV4fY3CvrbgsAEnBD3mSEpOea7tSNDTxY83D
6YJ40ZS2zN3bhBZos + Jp53tq8Eni1pSELS5wl5Yes + F4lmda + sK5gTOOExI2tWyA0z5V
7hkOQuxcLbvc9GR + ywibz binhnx2000@domain.com

All important information has been algorithmically coded

USE Private Key & amp; Public Key

Using Public Key, you must first distribute it. Or, in a nutshell, you have to activate these public keys in the appropriate locations on the remote server. As mentioned above the Public Key can be distributed freely and free of charge. So you can send it to any system you want to communicate with Open SSH. Create the Public Key directory at the root of Apache:
root@domain.com# : mkdir / var / html / pubkeys

Copy Binhnx2000's Public Key to the folder you just created and rename it:
root@domain.com# : cp /home/binhnx2000/.ssh/id_dsa.pub var / html / pubkeys / binhnx2000.pub

On the remote host system: You need to reference the same parameters as on your host. You log in as root and create another account binhnx2000:
root@domain2.com# : useradd binhnx2000
passwd binhnx2000
Changing the password for user binhnx2000
New UNIX password: 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-nghe? P = 1 en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label: Some Text link_original.txt link. txt log.txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02. html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable.com www.microsoft.com
Retype new UNIX password: 1 AzSoft_watermark_big.png AzSoft_watermark_small.png cong-list? P = 1 en_metadesc.txt en_name.txt getpageinfo.sh getpagelink.sh imglink.txt imglist.txt img.quantrimang.com label: Some Text link_original.txt link .txt meta_desc.txt name.txt news t-142619 testimg2-0.jpg testimg2-1.jpg testimg2.jpg testimg3.jpg testimg.jpg thumb tim-hieu-excel-2016-200.jpg title_vn.txt tmp02 .html tmp03.html tmp2.html tmpdesc2.txt tmpdesc3.txt tmpdesc4.txt tmpdesc5.txt tmpdesc6.txt tmpdesc7.txt tmpdesc.txt tmp.html tmpresult.txt tmptrans.txt transresult.txt wm.quantrimang.com www.mailenable. com www.microsoft.com
passwd: all authentication tokens được cập nhật thành công

Next create a subdirectory " .ssh "In the home directory of acc binhnx2000:
root@domain2.com# : mkdir /home/binhnx2000/.ssh

You have uploaded the address of binhnx2000's Public Key and download it to:
Save it to /home/binhnx2000/.ssh = = & gt; This is Public Key of domain.com. It contains information about IDs encoded by the DSA algorithm. Now that you've tried ssh from System 2 via System 1 with Public Key,

binhnx2000@domain2.com$ : ssh domain.com

If everything is stable you can safely ssh to remote system 1 through Open SSH. All transactions between systems 1 and 2 are compressed and encrypted to ensure secure transmission

VeriSign, for example, provides a Digital ID to encrypt and secure e-mails to customers. Digital IDs are essentially public keys that embed the basic ID information in them. VeriSign will automatically send the public key of the user to its site. Any user who wants to access the Public Key of another user. They can download the Digital ID of the user from the VeriSign site:

For Private Key. I will upload it to my web server. Remote hosts will download the public key and automatically activate them.

You will continue to perform the following steps if your system has Apache Web server installed:
However! life is not always as good as we thought ;-( you will encounter the message:

The authenticity of host domain.com can not be established.

DSA key fingerprint is
c: d: d5: 53: 13.
Are you sure to keep connecting (yes / no) 1
The above statement says that you can not establish a secure connection from System 2 to System 1 using Open SSH. You keep pressing

like to continue connecting. There will be a message saying that the Public Key of the remote system has been added to a logical location on the local system. The Public Key update was successful. Next time you will not see this annoying message anymore. You try ssh to the remote system again. (There will not be any password required, as it uses and validates the public key.) /home/binhnx2000/.ssh/know_host

Cảnh báo: Permanently added 'domain.com, 24.130.8.170'
(DSA) vào danh sách các máy đã biết.
[binhnx2000@domain.com binhnx2000] $
If the information about the Public Key is incorrect. In other words, the Public Key authentication process failed. Open SSH will ask you to provide the password of the user binhnx2000:

binhnx2000@domain.com's

password: The password here is the password of account binhnx2000 created on the remote system. When you enter a username and password similar to Telnet, the other point is that it is encrypted by Open SSH. If you encounter a password query request, review the allocation process and use the public key.

DATA PROBLEMS

So far the RSA and DSA Key are considered to be secure and the ability to encrypt data is quite high (Key RSA is now up to 256-bit encryption). In the middle of July, the Security community has discovered a bug that exploits the vulnerability of passphrases shorter than 2 characters. But it was quickly overcome and the practicality of this Bug is not high. Open SSH is still considered by the nix community as a secure medium.

Note

: This article is only for learning and exchange experience. You can freely use it, but please respect copyright slightly. Where to quote in the document please write the source and name of the writer ... Thank you for your interest in my article. (Powered by: binhnx2000 == (========= & gt; ^ ($) ^ Supporter Of VTF)
(E-mail:
binhnx2000@yahoo.com | Home: http://www.vieteam.com/) References


Using OpenSSH to Encrypt Network Traffic between Two Hosts
Deutsch Unix / Linux Gruppen (DUG)
Information of the Bibliothek Frei Universität Berlin (FU Berlin) Note
binhnx2000 Public Key can be distributed as you like. Anyone, any system that wants to communicate securely with binhnx2000 can receive Public Key . You can change the name of Public Key comfortable. For security purposes the Security advises you to frequently rename Public Key before being distributed to each person. binhnx2000@domain.com$ : rlogin -l binhnx2000 vnzone.net : rlogin -l binhnx2000 vnzone.net