Size: 2016
Comment:
|
← Revision 19 as of 2023-04-06 16:23:08 ⇥
Size: 2251
Comment:
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
= SSH = | = OpenSSH = |
Line 3: | Line 3: |
'''Secure Shell''' ('''SSH''') is a protocol that enables remote access to a server. This is primarily a Linux and BSD feature, with Windows systems preferring access by [[Protocols/RDP|RDP]]. The most common implementation is the '''OpenSSH''' project. The server-side service is `sshd(8)`, while there are various client-side programs such as `ssh(1)` or PuTTY. |
'''OpenSSH''' is a [[Encryption/SSH|SSH]] client (`ssh(1)`) and server (`sshd(8)`). |
Line 15: | Line 13: |
Most [[Linux]] and [[BSD]] distributions will have `ssh(1)` and `sshd(8)` installed. Otherwise, they will be available in an `openssl` package. | |
Line 16: | Line 15: |
=== Client === If necessary, install `openssh`. Most Linux and BSD distributions will include it by default. On [[Windows]], try PuTTY and hope it works. === Server === Many Linux distributions have `openssh` installed and `sshd(8)` running by default. This is especially true of ISOs meant for server boxes. |
Furthermore, many Linux distributions have `sshd(8)` running by default. |
Line 31: | Line 19: |
Otherwise try `service sshd enable` or setting the following in `/etc/rc.conf`: | For OpenRC-based systems, [[Linux/OpenRC|start and add]] the `sshd` service. For BSDs, [[BSD/Init|start]] the `sshd` service. To have it automatically start on boot, try editing `/etc/rc.conf` like: |
Line 37: | Line 27: |
[[Windows]] systems preferring access by [[Protocols/RDP|RDP]]. |
|
Line 41: | Line 33: |
== Configuration == | == Setup == |
Line 85: | Line 77: |
---- == Usage == The primary use of `ssh(1)` is to access a remote host: {{{ ssh [email protected] }}} See [[Encryption/OpenSSH/Tunnels|here]] for details on creating and using SSH tunnels. ---- == See also == [[https://man.archlinux.org/man/core/openssh/ssh.1.en|ssh(1)]] [[https://man.archlinux.org/man/core/openssh/sshd.8.en|sshd(8)]] [[Encryption/SSHKeyGen|SSHKeyGen]] [[Encryption/SSH|SSH]] |
OpenSSH
OpenSSH is a SSH client (ssh(1)) and server (sshd(8)).
Installation
Most Linux and BSD distributions will have ssh(1) and sshd(8) installed. Otherwise, they will be available in an openssl package.
Furthermore, many Linux distributions have sshd(8) running by default.
For systemd(1)-capable systems, start and enable sshd.service.
For OpenRC-based systems, start and add the sshd service.
For BSDs, start the sshd service. To have it automatically start on boot, try editing /etc/rc.conf like:
sshd_enable="YES"
Windows systems preferring access by RDP.
Setup
Require Authentication by Key
To require that all client logins use keys, use:
PubkeyAuthentication yes AuthorizedKeysFile .ssh/authorized_keys PasswordAuthentication no
To make an exception for a user, add at the bottom of the file:
Match User git PasswordAuthentication yes Match all
To make an exception for the local network, add (also at the bottom of the file):
Match Address 192.168.*.* PasswordAuthentication yes Match all
Login Messages
Usually any messages printed on login are actually handled by PAM. This can be tricky to configure, so instead disable the default login messages and configure the shell profile to print the desired messages.
To disable all PAM login messages for a user, try:
touch ~/.hushlogin
Note that default PAM configurations print /etc/motd and the output of /usr/bin/lastlog --user USERNAME on login.
Usage
The primary use of ssh(1) is to access a remote host:
ssh [email protected]
See here for details on creating and using SSH tunnels.