Secure Shell (SSH) in HP Systems Insight Manager 5.1 and 5.2

5
Other SSH implementations
There are a number of other implementations of SSH, most notably commercial versions of SSH1 and
SSH2 maintained and sold by F
-
Secure Corporation.
Refere
nce
For power users we recommend the O'Reilly reference,
SSH The Secure Shell
by Daniel Barrett and
Richard Silverman, 2001, as an excellent reference.
How does SSH work?
SSH is a network protocol be
tween two software modules: the SSH client, which initiates the
connection and the SSH server, which responds to the client. For example, an SSH client can be run
by a user to connect to a remote system which is running the SSH server.
The basic steps i
n setting up an SSH connection are:
1.
The SSH client sends a request to the remote SSH server.
2.
The SSH server responds with a public key.
3.
The SSH client decides if it accepts the public key. For example, it authenticates the SSH
server by comparing the key
with previously obtained value.
4.
The SSH client then sends user information to the remote SSH server. These credentials can
be a user name and password or public key authentication.
5.
The SSH server decides if it accepts the user credentials. For example
, it authenticates the
SSH client using the supplied password or from a previously stored public key.
6.
Once authenticated, the client and server can exchange data, such as executing commands
and returning results.
This is similar to a telnet connection.
However, it is a secure connection with all communications using
an encrypted channel.
The SSH connection process
The SSH protocol is utilized to establish a connection and then to log into the remote managed
system. After a successful login, any packets
which follow are encrypted using the SSH protocol. Each
system where SSH or OpenSSH is installed natively includes an SSH client and an SSH server.
Note:
This white paper refers to SSH and OpenSSH as SSH.
The following command is a common use of SSH for c
onnecting to another system using the
command window. The command line to connect to another system:
$ ssh
l smith host.example.com
(
-
v turns on verbose mode)
In this case, your SSH client is initiating a connection to the remote SSH server host called
ho
st.example.com using the login name of smith. You can use the
v option to turn on the verbose
mode so the transaction can be followed.