Our Scenarios
System Security Hardening, Systems Administration

Configuring SSH in Linux

Configuring SSH Remote Connection in Linux

There are different methods that can be used to remotely login to a Linux system. Some of these include the use of SSH (Secure shell), Telnet, Virtual Network Computing (VNC) e.t.c. Most of these remote login methods, except SSH, however are insecure as data is sent over the network in plain text over unencrypted channel and hence it is possible to sniff on the sensitive data being transmitted. VNC however, encrypts passwords by the data is sent unencrypted.

Objectives of this Scenario

In this scenario, you are going to learn; - Basic introduction to SSH - Configure SSH and Secure SSH Access - Disallowing root access - Disabling password based authentication - Configuring maximum number of authentication attempts - Selectively allowing users to login - Selectively denying users to login - Chrooting SSH users - Reducing SSH Login Timeout Interval - Configuring SSH user configuration file - SSH Key-based Authentication - Copying Files Over SSH - Using SCP - Using SFTP - SSH Authentication SSH-Agent - Configure SSH Tunneling