SSH Server
SSH Server
Abstract
This guide will develop the procedure that will allow you to practice
the knowledge acquired in the theoretical class of server management.
The topic to be developed is SSH.
1 Introduction
SSH TM (or Secure SHell) is a protocol that facilitates secure communications
between systems using a client / server architecture and allows users to connect
a host remotely. Unlike other communication protocols, communication such as
FTP or Telnet, SSH, connection session, it is impossible to obtain unencrypted
passwords.
SSH is designed to replace older and less secure methods for records remotely
in another system through the command shell, such as telnet or rsh. A related
program, the scp, replaces other programs to copy files between hosts as rcp.
Since these old applications are not related to the client and the server, although
use them as much as possible. The use of secure methods to remotely register
other systems reduces security risks for both the client system and the remote
system.[2].
2 Characteristics of SSH
The SSH protocol provides the following types of protection:
• After the initial connection, the client can verify that he is connecting to
the same server to which he was previously connected
1
• The client transmits its authentication information to the server using
robust 128-bit encryption
• All data sent and received during the session is transferred through 128-bit
encryption, which makes them extremely difficult to decipher and read.
• The client has the possibility of forwarding X11 applications [1] from the
server. This technique, called forwarding by X11, provides a secure means
to use graphical applications over a network.
3 Development of Practice
The development of the practice will take place in the distribution of Open Suse
Leap 15, it is clear that this practice can be extended to other distributions
taking into account their respective changes. s
2
3.1.2 Start service and add the service to the system boot.
SSH is a service that must be enabled once it has been configured. And it must
be restarted when a new configuration has been made, for it to execute the
following commands.
3
Modify the file as shown below:
4
Modify the file as shown below:
and finally we copy and paste all the files that came compressed in this folder.
To access the service we open a command console (cmd) by typing Windows +
R followed by an Enter,
4 Exercise
Install and configure the SSH server, as shown throughout the development of
the practice, mount a network and test it.
References
[1] sshsecurity/openSUSE Leap 15.0”, doc.opensuse.org 2018
[2] SSH protocol”, web.mit.edu 2018