Secure Shell (SSH) in HP SIM

4
scp
,
which replaces
rcp
sftp
,
which replaces
ftp
sshd
,
which is the server side of the package
Other basic utilities
include
ssh
-
add
,
ssh
-
agent
,
ssh
-
keysign
,
ssh
-
keyscan
,
ssh
-
keygen
,
and
sftp
-
server
.
Other SSH implementations
O
ther implementations of SSH
include
commercial versions of SSH1 and SSH2 maintained and sold
by F
-
Secure Corporation.
How does SSH work?
SSH is
a network protocol between two software modules: the SSH client, which initiates the
connection and the SSH server,
which responds to the client.
For example, an SSH client can be run
by a user to connect to a remote system
,
which is running the SSH server
.
The basic steps
in setting up an SSH connection
are
as follows
:
1.
The SSH client sends a request to the remote SSH server.
2.
The SSH server responds with a public key.
3.
The SSH client decides if it accepts the public key. For example, it authenticates the
SSH
server by comparing the key with previously obtained value.
4.
The SSH client then sends user informa
tion to the remote SSH server.
These credentials can be
a user name and password or public key authentication.
5.
The SSH server decides if it accepts th
e user credentials. For example, it authenticates the
SSH client using the supplied password or from a previously stored public key.
6.
After
authenticat
ion is complete
, the client and server can exchange data, such as executing
commands and returning resul
ts.
This
connection
is similar to telnet. However,
the communication i
s secure with all communications
using an encrypted channel.
The SSH connection process
The SSH protocol is utilized to establish a connection and then to log in
to the remote managed
system. After a successful login, any packets
that
follow are encrypted using the SSH protocol. Each
system where SSH or OpenSSH is installed natively includes an SSH client and an SSH server.
Note:
This white paper refers to SSH and OpenSSH as SSH.
The f
ollowing command is a common use of SSH for connecting to another system using the
command window.
Issue the following
command line to connect to another system:
$ ssh
l smith host.example.com
(
-
v turns on verbose mode)
OR
$ ssh
l
ip address of remote sy
stem
(
-
v turns on verbose mode)
In this case, your SSH client is initiating a connection to the remote SSH server host called
host.example.com using the login name of smith. You can use the
v option to turn on the verbose
mode so
that
the transaction can
be followed.