I run my weblog on my server, both out of hobby and because it gives me complete control over the underlying operating system, available software and security mechanisms. As a result, I see all that goes on with this machine, both good and bad.
When trying to set up a SSH tunnel through a remote host in order to bypass a pesky firewall, I received an error which I did not immediately understand. Continue reading SSH tunneling error
Welcome to the second instalment of the ssh files. In this instalment, we’ll be taking a look at logging in without a password, using public key authentication. The major benefit of logging in through public key authentication, is that you will only have to remember the pass phrase of your key and no longer a dozen or more passwords on different servers. Also, setting your ssh daemon to only allow public key authentication will foil any attempts by script kiddies to brute force your password…because there isn’t one. Continue reading The ssh files (2)
If you have ever had to administer Linux (or Unix) servers, you are probably familiar with ssh, the secure shell client. For those of you not familiar with ssh, think “telnet on steroids”. For those of you not familiar with telnet or ssh…what are you doing administering servers? Ssh is like the Swiss army knife of remote connectivity. It can do so much that I think that no one has ever used all of the features it offers. This article is an exploration of the basics of ssh, future articles will explore its functionality in more depth. Continue reading The ssh files (1)