|
You are here |
www.jhanley.com | ||
| | | | |
www.jamieweb.net
|
|
| | | | | Using Git to centrally manage, verify, update and distribute your SSH known_hosts. | |
| | | | |
colincogle.name
|
|
| | | | | SSH is easy to secure, but that doesn't mean there isn't more work to be done. | |
| | | | |
materials.rangeforce.com
|
|
| | | | | SSH (secure shell) is a widely-used protocol for remote administration of Unix and Linux servers. The default configuration of many SSH server implementations includes several potentially-insecure settings so as to maintain compatibility with outdated client software. The ssh-audit tool can be used to check the server settings and recommend changes so as to improve security. | |
| | | | |
dustymabe.com
|
|
| | | It is common practice among Linux users to exchange ssh keys between machines so that you can ssh between them without having to authenticate. The manual process for doing this involves taking the public key of the local host (~/.ssh/id_rsa.pub or ~/.ssh/id_dsa.pub) and appending it to the ~/.ssh/authorized_keys file of the remote host you wish to log in without a password. This process is simple, but requires a few different steps. | ||