Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for Using Public Key Authentication with SSH

Unix+clones Using Public Key Authentication with SSH
Post date: June 26, 2008, 05:06 Category: Network Views: 1290 Comments: 0
Tutorial quote: The current leading SSH server, OpenSSH, offers two main methods of authentication: interactive password and public key authentication. While interactive password authentication is the default, there are several reasons for using public key authentication. After reading some background information about public key cryptography, you should have a firm understanding of what public key cryptography is and how it works. You're welcome to skip straight to generating keys for use with SSH. Setting up public key authentication will require a few minutes, but the results are worthwhile.
Debian How To Set Up SSH With Public-Key Authentication On Debian Etch
Post date: March 30, 2008, 08:03 Category: Security Views: 1107 Comments: 0
Tutorial quote: This guide explains how to set up an SSH server on Debian Etch with public-key authorization (and optionally with disabled password logins). SSH is a great tool to control Linux-based computers remotely. It is safe and secure.
Unix+clones Setup the SSH server to use keys for authentication
Post date: November 16, 2005, 14:11 Category: Network Views: 999 Comments: 0
Tutorial quote: The user creates a keypair, which consists of a private key, that can be protected with a passphrase, and a public key. The public key is transfered to the server and the private key is kept in our workstation. We assume that the user has accounts in both the server machine and his workstation. Everytime he tries to connect to the server, the keys are validated and the user is granted access.
Linux Key-Based SSH Logins With PuTTY
Post date: December 10, 2006, 14:12 Category: Security Views: 1162 Comments: 0
Tutorial quote: This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH using PuTTY. PuTTY is an SSH client that is available for Windows and Linux (although it is more common on Windows systems). Using key-based SSH logins, you can disable the normal username/password login procedure which means that only people with a valid private/public key pair can log in. That way, there is no way for brute-force attacks to be successful, so your system is more secure.
Unix+clones Securing automated rsync over SSH
Post date: July 2, 2008, 06:07 Category: Network Views: 1426 Comments: 0
Tutorial quote: An insightful article about SSH key authentication and how to use it to secure automated RSYNC.
Debian sshpass - Non-interactive ssh password authentication
Post date: May 4, 2008, 17:05 Category: Security Views: 1309 Comments: 1
Tutorial quote: SSH’s (secure shell) most common authentication mode is called “interactive keyboard password authentication”, so called both because it is typically done via keyboard, and because openssh takes active measures to make sure that the password is, indeed, typed interactively by the keyboard.

Sometimes, however, it is necessary to fool ssh into accepting an interactive password non-interactively. This is where sshpass comes in.
Unix+clones OpenSSH/Keychain Howto
Post date: April 12, 2005, 12:04 Category: Network Views: 1009 Comments: 0
Tutorial quote: This howto will show you the fundamental ways to use OpenSSH; how to generate public/private key pairs and strong passphrases, and how to use the wonderful Keychain utility to automate your SSH logins. This is exceptionally handy when you log in and out frequently, and don't want to keep entering your passphrase.
Unix+clones Bypass any Firewall or Throttling ISP with SSH
Post date: October 22, 2007, 01:10 Category: Network Views: 2029 Comments: 0
Tutorial quote: On some networks it’s impossible to use BitTorrent. For example, if you’re at work, school, or connected to Comcast or a public hotspot. But there’s an easy solution to overcome this problem. By using a secure connection (SSH), you can bypass almost every firewall or traffic shaping application.
Linux How to secure VNC remote access with two-factor authentication
Post date: May 21, 2007, 17:05 Category: Security Views: 947 Comments: 0
Tutorial quote: VNC is the most popular remote access solution today. However, it was developed to provide remote access, not to provide secure remote access. Administrators have to add security to VNC by tunneling it through an encrpyted channel such as SSH and adding a layer of authentication. In this article, we will show you how to combine the NoMachine NX server to encrpyt VNC and remote X session combined with two-factor authentication from WiKID Systems to create a secure, fast remote access solution.
Debian A couple of tricks with the secure shell
Post date: September 18, 2006, 08:09 Category: Network Views: 7470 Comments: 0
Tutorial quote: One can do a lot more with ssh than use it for remote terminal session. Here we'll show how to copy files using ssh, use ssh as part of a pipe, vnc or samba forwarding via ssh and mounting filesystems using ssh (fuse + sshfs).