More Linux Remote Networking Tips and Tricks (part 2)
Oct 21, 2009, 20:03 (1 Talkback[s])
(Other stories by Carla Schroder)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
"Last week we looked at some good ways to use OpenSSH and SSHFS
for easy file sharing on the LAN. Today we're going to review how
to use encryption keys instead of password logins. Using key pairs
is less flexible but more secure because it's like using a key lock
instead of a combination lock. There is no way to brute-force a
password, you don't have to give away system passwords, and only
users who possess the key can get in.
"With OpenSSH the machine you are logging into is always the
server, because the OpenSSH daemon needs to be running and
listening for connection attempts. The PC you are logging in from
is the client. Again, like in Part 1, this is for LANs only because
remote access over the Internet is more complicated to set up.
We'll do that next in Part 3."