From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

SSH basics

SSH basics

- [Instructor] Before we get into any kind of SSH security, I want to talk about some basic SSH. So if you look at the slide here, you'll see that SSH stands for secure shell. We use that to remotely control systems from the command line, and basically it involves a four-step process. First, the SSH client initiates a connection to an SSH server, and this server could be really anything. It could be an actual server system, it could be another client computer, it could be a switch or router or firewall, and so on and so on. But the first step is the client initiates a connection to that server. The server then sends out a public key in the hopes that it will have an authenticated connection. The two then handshake. Hopefully they handshake or agree on parameters and open up a secure channel, and then finally the user at the client logs on to the SSH server and can then take control. So for this little demo, the SSH client is going to be my Debian client and the SSH server is going to…

Contents