Where to get RPM binary builds:
http://www.linux-mandrake.com/en/fcrypto.php3
From MandrakeUsers.org
http://mandrakeuser.org/secure/index.html
QUOTE:
SSH I - Installation
What Is SSH?
The traditional network services like ftp, pop or telnet are
convenient but inherently unsafe, since they all make you send a
password and data in clear text over an increasingly unsafe network.
It is almost a no-brainer to intercept these services and copy
transferred data. Furthermore the authentication of the server is
weak: the services are open to so-called 'man-in-the-middle' attacks,
where an intruder pretends to be the server and thus receives all
data the client is sending.
Enter SSH (Secure SHell). By using SSH, you encrypt the traffic and
you can make 'man-in-the-middle' attacks almost impossible. It also
protects you from DNS and IP spoofing. As a bonus, it offers the
possibility to compress the traffic and thus make transfers faster.
SSH is a very versatile tool: not only does it replace telnet, you
can also 'tunnel' services like ftp, pop and even ppp via it.
SSH implementations exist for almost all major operating systems.
The original SSH has been developed by a Finnish company. Due to
copyright restraints and patented algorithms, the Free Software world
now uses OpenSSH, a free SSH workalike.
SSH consists of a client-server pair like all the other services.
Every system administrator worth his money runs an SSH server. If
your remote host doesn't run SSH, you should really think about
switching to a host which does. A site which doesn't run an SSH
server shows a serious lack of interest in network security.
SSH comes in two major, partly incompatible versions, 1.x and 2.x.
You won't be able to connect to an SSH 1.x server with an SSH 2.x
client. OpenSSH 2.x supports both versions.
section index / top
How SSH Authentication Works
Seen from the client level, SSH provides two levels of authentication.
The first level allows you to connect from any machine to a SSH
server, as long as you know the password of the account on the remote
machine. This encrypts any traffic sent via SSH, but doesn't provide
a strong mechanism to authenticate the host you are connecting to.
Another host could intercept your connection by pretending to be the
host you want to connect to ('man-in-the-middle-attack').
The second level relies on the key mechanism: you create your own
keypair and put the public key onto the server. Now if you connect to
the SSH server, your client sends a request to the server for
authentication using your keys. The server looks up the public key in
your remote home directory, and compares both keys. Then it sends an
encrypted challenge to the client. This challenge is decrypted on the
local machine using the private key and sent back to the server.
Using this method, you will have to know the password of your key (if
you choose to use one). In contrast to level one, this password will
not be sent over the network. Level two authentication doesn't use
any passwords at all. This scheme not only encrypts any travel sent
via SSH, but also makes 'man-in-the-middle' attacks next to
impossible. This login process usually takes ten seconds.
section index / top
Installing And Testing OpenSSH
Due to U.S. restrictions on exporting strong cryptography, the
OpenSSH packages are not included in LM. You can download them from
one of the servers listed on LM's crypto apps page.
You will need these packages:
openssl openssh openssh-clients and, if you want to run an
ssh-server, openssh-server
Of course the truly paranoid will prefer building them from source,
but usually RPMs will do ;). Note that 7.1 OpenSSH RPMs will not
install on 7.0.
To test your installation, connect to a SSH server:
ssh -l [your accountname on the remote host] [address of the remote host]
If this works, you will receive a message like this:
The authenticity of host [hostname] can't be established. Key
fingerprint is 1024 5f:a0:0b:65:d3:82:df:ab:44:62:6d:98:9c:fe:e9:52.
Are you sure you want to continue connecting (yes/no)?
SSH tells you that it doesn't know this host, which is nothing to
worry about, since you are connecting for the first time. Type yes.
This will add the 'fingerprint' of this host to '~/.ssh/known_hosts'.
Future connects to the host will not display this message. Then SSH
will prompt you for your account password on the remote machine. Type
it, press ENTER et voila, you've established your first SSH
connection! Now proceed just like you would in a telnet session.
Installing an OpenSSH server is easy, too. Just install the RPM.
During the installation, you will get a message like this:
Generating RSA keys: .ooooooO..................ooooooO Key generation
complete. Your identification has been saved in
/etc/ssh/ssh_host_key. Your public key has been saved in
/etc/ssh/ssh_host_key.pub. The key fingerprint is:
5f:a0:0b:65:d3:82:df:ab:33:52:6f:89:9a:fe:e9:52 root@[local machine]
Generating DSA parameter and key. Your identification has been saved
in /etc/ssh/ssh_host_dsa_key. Your public key has been saved in
/etc/ssh/ssh_host_dsa_key.pub. The key fingerprint is:
64:85:4a:da:cf:74:94:0d:5a:93:cf:f2:62:ed:07:26 root@[local machine]
This message indicates that the key, which identifies your machine to
clients, has been generated. It is a very good idea to keep external
backup copies of these keys!
Start the server with
service sshd start
That's all. Now external ssh-clients can connect to the machine
(provided they have an account on your machine, naturally). If you
want the SSH server to be started every time you boot the machine, run
chkconfig --add sshd
section index / top
Now that you've got it running basically, learn how to set up SSH ...
UNQUOTE:
--
Come visit the Trailer Park of the Apocalypse...
we survived the Millennium.... or maybe we were LEFT BEHIND!
[EMAIL PROTECTED] --- http://www.users.uswest.net/~hsundt3/