BIP KB Tag: ssh

How To Configure SSH Key-Based Authentication On A FreeBSD Server

Introduction to SSH Key Based Authentication This tutorial is part 3 of 7 in the series: Getting Started with FreeBSD. In general SSH, or secure shell, is a network protocol that provides a secure, encrypted way to communicate with and administer your servers. As SSH is the most common way of working with a FreeBSD server, you will want to familiarize yourself with the different ways that you can authenticate and log in to your server. W...
By jack, January 23, 2015


How To Disable Shell Access For A Specific User

If you would like to disable shell access for a specific user you can do the following. In this example we will disable shell access for username johnsmith: chsh -s /bin/false johnsmith Please note that this disables shell access for the user when they are logging in using the normal means. If the user is able to execute commands through a PHP/CGI script they can spawn their own shell. ...
By tilisha, January 24, 2015


How To Use DD Over Netcat Vs SSH

dd is a very handy shell command for writing raw data blocks from one place to another. Since it can read directly from raw device files, it is very useful for copying entire partitions or drives from one location to another. One traditional way to get this drive data from one location to another is to pipe DD's output stream over SSH to a shell on a remote machine which in turn uses dd to pipe it to a given output file/device. This i...
By tabitha, January 24, 2015


How To Synchronize A Directory From One Linux Server To Another Using Rsync

In this tutorial we will be using Rsync to synchronize a directory from Linux ServerA to Linux ServerB over SSH using two CentOS servers. To begin we recommend you setup SSH keys between the two servers. To do this you can follow our below tutorials though is not required : How to Set Up SSH Keys with Linux Commandline How to add your SSH public key to CentOS First lets make sure RSYNC is installed. yum install rsync Ok ...
By jason, March 17, 2015


How To Set Up SSH Keys With Linux Command Line

Introduction To Setting Up SSH Keys In this tutorial we are going to setup encrypted SSH Keys for authentication. There are many benefits to this type of setup which include: No longer needing to enter a password (unless you encrypt your keys with password protection *recommended*) Once public/private key pair authentication is configured, you can disable password authentication completely and only allow access via the key. Sto...
By jack, March 17, 2015


How To Add Your SSH Public Key To CentOS

Introduction to SSH Public Key In this tutorial we are going to add our public key for authentication through SSH. There are many benefits to this type of setup which include: No longer needing to enter a password (unless you encrypt your keys with password protection *recommended*) Once public/private key pair authentication is configured, you can disable password authentication completely and only allow access via the key. St...
By samantha, March 17, 2015


How To Configure SSH Key Access Authentication Only On Your CentOS SSH Server

Introduction to SSH Key pairs This how to assumes you have SSH Key installed on your server. If you do not you can follow either of the how to’s below: How to Set Up SSH Keys with Linux Commandline In this tutorial we will be: Changing The SSH Servers Po1rt Allowing connections only va PubkeyAuthentication. We will begin by editing your SSH servers configuration file: /etc/ssh/sshd_config vi /etc/ss...
By samantha, March 17, 2015


How To Install Ruby On Rails On Ubuntu 12.04 LTS

Install Ruby Introduction This tutorial will show you how to install Ruby Version Manager (RVM) which can be used to install Ruby, and then RubyGems, which can be used to install the Ruby on Rails framework. Finally, we’ll create an empty application and see it run: SSH to your Pod as root, and then run the following: root@rubyserver:~# \curl -L https://get.rvm.io | bash -s stable root@rubyserver:~# source /etc/profile.d...
By chris, March 18, 2015


What Is SSH?

Introduction to SSH Secure Shell Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. The two major versions of the protocol are SSH-1 and SSH-2. Shell Shell is a program to log into another computer over a network to execute commands in a remote machine and to move files from one machine to another. It provides strong authentication and secure co...
By tasia, April 6, 2015


How To Get An SSH Client

To access your account via SSH you should download and install one of available SSH clients. You can find the list of freev in the table below. If you have Windows, we recommend to use “PuTTy” as your SSH client. PuTTY (Windows and Unix) Download PyTTY WinSCP (Windows) (SCP and SFTP, no SSH) Download WinSCP Fugu (Macintosh) Download Fugu Cyberduck (Macintosh) (SFTP only) Download Cyberduck...
By steve, April 6, 2015


SCP And SFTP - Secure File Transfer Using SSH

SCP means a Secure Copy. It is a method of remote communication and sending files between networks, but having the sent files secured with the SSH (Security Shell) protocol. It allows to transfer files without information leakage. SCP is a substitute for the legacy `cp` file transfer application. SFTP stands for Secure File Transfer Protocol. This is an application which uses Secure Shell in relocating files. It avoids the plain transmis...
By jill, April 6, 2015


How To Secure ssh

Here are couple ways to change your sshd default configuration settings and make / Secure ssh daemon more secure / restrictive and thus protect your server from unwanted intruders. NOTE: Everytime you make changes in the sshd configuration file you need to restart sshd. By doing so, your current connections will not be closed ! Make sure that you have a separate terminal open with root logged-in in case you do some misconfigurat...
By tapish01, June 26, 2015


How To Install And Configure SSH On CentOS

How do I install and configure both ssh server and client under CentOS Linux operating systems? You need to install the following packages (which are installed by default unless you removed it or skipped it while installing CentOS) openssh-clients : The OpenSSH client applications openssh-server : The OpenSSH server daemon     OpenSSH Installations under CentOS Linux To install the server and client type: ...
By tapish01, September 6, 2015


How To install Fail2ban "service SSH" on CentOS/RHEL 7

About Fail2Ban Servers do not exist in isolation, and those servers with only the most basic SSH configuration can be vulnerable to brute force attacks. fail2ban provides a way to automatically protect the server from malicious signs. The program works by scanning through log files and reacting to offending actions such as repeated failed login attempts. Install Repository Because fail2ban is not available from CentOS, we s...
By vladimir, September 28, 2015