0% found this document useful (0 votes)
99 views2 pages

OpenSSH Server

The document provides an introduction to OpenSSH, a secure shell protocol for remotely controlling and transferring files between computers. It discusses how OpenSSH works, how to install the OpenSSH client and server, and how to configure the OpenSSH server by editing configuration files. It also describes how to set up SSH key-based authentication to login without a password.

Uploaded by

Link Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views2 pages

OpenSSH Server

The document provides an introduction to OpenSSH, a secure shell protocol for remotely controlling and transferring files between computers. It discusses how OpenSSH works, how to install the OpenSSH client and server, and how to configure the OpenSSH server by editing configuration files. It also describes how to set up SSH key-based authentication to login without a password.

Uploaded by

Link Nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Ubuntu.

com Community Support Partners

Official Documentation Community Help Wiki Contribute

Search

Ubuntu 16.04 » Ubuntu Server Guide » Remote Administration »

OpenSSH Server Trước Tiếp

Giới thiệu
Installation
Configuration
SSH Keys
References

Giới thiệu
This section of the Ubuntu Server Guide introduces a powerful collection of tools for the remote control of, and transfer of data between,
networked computers called OpenSSH
. You will also learn about some of the configuration settings possible with the OpenSSH server application
and how to change them on your Ubuntu system.

OpenSSH is a freely available version of the Secure Shell (SSH) protocol family of tools for remotely controlling, or transferring files between,
computers. Traditional tools used to accomplish these functions, such as telnet rcp
or , are insecure and transmit the user's password in cleartext
when used. OpenSSH provides a server daemon and client tools to facilitate secure, encrypted remote control and file transfer operations,
effectively replacing the legacy tools.

The OpenSSH server component, sshd


, listens continuously for client connections from any of the client tools. When a connection request occurs,
sshd sets up the correct connection depending on the type of client tool connecting. For example, if the remote computer is connecting with the
ssh client application, the OpenSSH server sets up a remote control session after authentication. If a remote user connects to an OpenSSH server
with scp
, the OpenSSH server daemon initiates a secure copy of files between the server and client after authentication. OpenSSH can use many
authentication methods, including plain password, public key, and Kerberos
tickets.

Installation
Installation of the OpenSSH client and server applications is simple. To install the OpenSSH client applications on your Ubuntu system, use this
command at a terminal prompt:

sudo apt install openssh-client

To install the OpenSSH server application, and related support files, use this command at a terminal prompt:

sudo apt install openssh-server

The openssh-server package can also be selected to install during the Server Edition installation process.

Configuration
You may configure the default behavior of the OpenSSH server application, sshd
, by editing the file /etc/ssh/sshd_config. For information about
the configuration directives used in this file, you may view the appropriate manual page with the following command, issued at a terminal prompt:

man sshd_config

There are many directives in the sshd


configuration file controlling such things as communication settings, and authentication modes. The following
are examples of configuration directives that can be changed by editing the /etc/ssh/sshd_config file.

Prior to editing the configuration file, you should make a copy of the original file and protect it from writing so you will have the original
settings as a reference and to reuse as necessary.

Copy the /etc/ssh/sshd_config file and protect it from writing with the following commands, issued at a terminal prompt:

sudo cp /etc/ssh/sshd_config /etc/ssh/sshd_config.original


sudo chmod a-w /etc/ssh/sshd_config.original

The following are examples of configuration directives you may change:

1. To set your OpenSSH to listen on TCP port 2222 instead of the default TCP port 22, change the Port directive as such:

Port 2222

2. To have sshd allow public key-based login credentials, simply add or modify the line:
PubkeyAuthentication yes
If the line is already present, then ensure it is not commented out.

3. To make your OpenSSH server display the contents of the /etc/issue.net file as a pre-login banner, simply add or modify the line:

Banner /etc/issue.net

In the /etc/ssh/sshd_config file.

After making changes to the /etc/ssh/sshd_config file, save the file, and restart the sshd server application to effect the changes using the
following command at a terminal prompt:

sudo systemctl restart sshd.service

Many other configuration directives for sshdare available to change the server application's behavior to fit your needs. Be advised,
however, if your only method of access to a server is ssh , and you make a mistake in configuring sshd via the /etc/ssh/sshd_config file,
sshd
you may find you are locked out of the server upon restarting it. Additionally, if an incorrect configuration directive is supplied, the
server may refuse to start, so be extra careful when editing this file on a remote server.

SSH Keys
SSH keys allow authentication between two hosts without the need of a password. SSH key authentication uses two keys, a private key and a
public key.
To generate the keys, from a terminal prompt enter:

ssh-keygen -t rsa

This will generate the keys using the RSA Algorithm. During the process you will be prompted for a password. Simply hit Enter when prompted to
create the key.

By default the public


key is saved in the file ~/.ssh/id_rsa.pub, while ~/.ssh/id_rsa is the private key. Now copy the id_rsa.pub file to the
remote host and append it to ~/.ssh/authorized_keys by entering:

ssh-copy-id username@remotehost

Finally, double check the permissions on the authorized_keys file, only the authenticated user should have read and write permissions. If the
permissions are not correct change them by:

chmod 600 .ssh/authorized_keys

You should now be able to SSH to the host without being prompted for a password.

References
1. Ubuntu Wiki SSH page.

2. OpenSSH Website

3. Advanced OpenSSH Wiki Page

Trước Tiếp

The material in this document is available under a free license, see Legal for details.
For information on contributing see the Ubuntu Documentation Team wiki page. To report errors in this serverguide documentation, file a bug report.

You might also like