Thanks everyone for the info. I've got ssh running on both my workstation and 
home PC and can connect securely now and that makes me feel a bit better then 
having everything on an open channel.

thanks
-- 
Mark

"If you don't share your concepts and ideals, they end up being worthless," 
"Sharing is what makes them powerful."

                                Linus Torvalds

On Thursday 11 January 2001 01:13 am, you wrote:
> Homepage: http://www.openssh.com/
>
> In short, ssh works similar to telnet.  The difference is that with
> telnet, you feed the login name at a prompt.  With ssh, you give the
> login name on the command line.  (ssh user@host)  ie:
>
> [EMAIL PROTECTED]
>
> If you omit the username (ssh deathstar.empire.com) ssh uses the
> username of your current local login.
>
> The big difference between telnet and ssh is that communications
> using ssh travel over an encrypted tunnel whereas communications
> with telnet are transmitted in the clear (plaintext).  To be able
> to ssh into a machine, it needs to be running sshd.  Most
> configurations run sshd as a standalone daemon and not in inetd (or
> xinetd) but you can choose that alternative if you feel so inclined.
> If you use the Mandrake RPMs (they come stock with 7.2 and are
> available as a download durring install for 7.0 and 7.0), sshd will
> be setup for you.  Using drakxservices, simply select sshd as one of
> the services to start on boot.  Alternatively, you can get generic
> RPMs from the URL above.They too should show as an option in
> drakxservices.  You can, of course, manually start and stop the
> service by:
>
> /etc/rc.d/init.d/ssh start
> /etc/rc.d/init.d/ssh stop
>
> The first time you ssh into a host, you will be asked to accept a
> key, choose yes and that computer will have an ID in your
> ~/.ssh/known_hosts file.  Should that key ever change, you will be
> notified and should contact the remote machine's administrator to
> see if the key should have changed.  If you are told it shouldn't
> have changed, then you have indication of a security issue such as
> a "man-in-the-middle attack".  Possible legitimate reasons for key
> change include the remote adminstrator deciding to change keys, a
> re-install of sshd, and a re-install of the remote server.  This
> is not an all inclusive list.
>
> ssh also provides some other benefits including automatic X
> forwarding (ssh -X) where you can ssh to a remote machine, start
> an X program and have it display on your local machine with no
> pre-configuration on your part.  The transmission of the remote
> program will also take place over your encrypted ssh tunnel.
> Finally (of the quick overview), there is scp (secure copy) that
> allows you to transfer (encrypted tunnel) files between ssh capable
> hosts.  'man scp' for the gory details.  Other sources of
> information include the man pages for ssh and sshd.
>
> Good luck and enjoy,
>
>       Woody


Reply via email to