OpenSSH is a free, open source implementation of the SSH (SecureSHell)
protocols. It replacestelnet,ft p,rl o g i n,rsh, andrcp with secure,
encrypted network connectivity tools. OpenSSH supports versions 1.3, 1.5,
and 2 of the SSH protocol. Since OpenSSH version 2.9, the default protocol
is version 2, which uses RSA keys as the default.
If you use OpenSSH tools, you are enhancing the security of your
machine. All communications using OpenSSH tools, including
passwords, are encrypted.Te l net andft p use plain text passwords
and send all information unencrypted. The information can be
intercepted, the passwords can be retrieved, and your system could
be compromised by an unauthorized person logging in to your system
using one of the intercepted passwords. The OpenSSH set of utilities
should be used whenever possible to avoid these security problems.
running the X Window System on your local machine, and you log in
to a remote machine using thessh command, when you run a
program on the remote machine that requires X, it will be displayed on
your local machine. This feature is convenient if you prefer graphical
system administration tools but do not always have physical access to
To run an OpenSSH server, you must first make sure that you have the
proper RPM packages installed. Theopenssh-server package is required
and depends on theopenssh package.
The OpenSSH daemon uses the configuration file/etc/ssh/sshd_config. The default configuration file should be sufficient for most purposes. If you want to configure the daemon in ways not provided by the default
If you reinstall, the reinstalled system creates a new set of identification
keys. Any clients who had connected to the system with any of the
OpenSSH tools before the reinstall will see the following message:
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-
It is also possible that the RSA host key has just been
Thessh command is a secure replacement for therl o g i n,rs h, andte l net commands. It allows you to log in to a remote machine as well as execute commands on a remote machine.
Logging in to a remote machine withssh is similar to usingte l net. To log in
to a remote machine named penguin.example.net, type the following
command at a shell prompt:
The authenticity of host 'penguin.example.net' can't be
DSA key fingerprint is
Are you sure you want to continue connecting (yes/no)?
Now bringing you back...
Does that email address look wrong? Try again with a different email.