If there is any issue at setup or connection contact support@k21technologies.com
Overview of Unix
Activity Guide11
[Edition 1]
[Last Update 130815]
For any issues/help contact : support@k21technologies.com
If there is any issue at setup or connection contact support@k21technologies.com
Administering Remote System
There are couple of waysthat youcan access a shell(commandline) remotelyonmostLINUX/UNIX
systems.One of the olderwaysisto use the telnetprogram, whichis available onmostnetworkcapable
operatingsystems.Accessingashell accountthroughthe telnetmethodthoughposesadangerinthat
everythingthatyousendorreceive overthattelnetsessionisvisibleinplaintexton yourlocal network,
and the local networkof the machine youare connectingto.Soanyone whocan "sniff"the connection
inbetweencansee yourusername,password,email thatyouread,andcommandthat yourun. For
these reasonsyouneedamore sophisticated programthantelnettoconnecttoa remote host.
SSH, whichisan acronymfor secure shell,wasdesignedandcreatedtoprovide the bestsecuritywhen
accessinganothercomputerremotely,Notonlydoesitencryptthe session,italsoprovidesbetter
authenticationfacilities.
SSH configurationfile is /etc/ssh/sshd_config
SSH daemonor service is sshd
Accessingthe remote machine using ssh
Syntax: ssh<ip address/ host name ofremote machine>
Note:hostname canonlybe usedwhenthe hostname issavedin/etc/hostsfile or,if DNSisconfigured
The firsttime aroundit will askyouif you wishtoadd the remote hostto a listof known_hosts,go
aheadand say yes
Enter the passwordof the remote systemcorrectly,onnce loggedincheckhostname andipaddressto
confirmlogin.
If there is any issue at setup or connection contact support@k21technologies.com
To leave the session,justtype exitorlogoutcommandandyouwill be back to your ownmachine
throughwhichyouare loggedin
PasswordlessloginusingSSHKeys
 As a systemadmin,one personwillbe assignedtomanage manysystems,forexampleone
person hasto manage more than10 systemsat a time.Inthissituationadminhas to transfer
some filesfromone systemtoanother9 systemsorvice versa,foreveryloginonremote system
it will promptforpassword.Evenfortransferringfilesforeverytransferwe needtoenterthe
password.
 Above situationwill be be veryannoying forsystemadmintotype passwordforeverystep.
therefore SSHprovidesabestwayto escape passwordpromptingeverynow andthen.
 By generatingSSHkeys,apublickeyandaprivate key,anadmincancopy the publickeyinto
othersystemanddone,itwill workas authorizedaccessfromthe admin'ssystem.Now
wheneverwe are loggingfromadmin'ssystemtoothersysteminwhichwe have storedthe
publickeyof admin'ssystem,itwill notpromptusfor passwordandwe can loginto that system
as many time as we want withoutbeingpromptforthe password.
 SSH keysare an implementationof public-keycryptography.Theysolvethe problemof brute-
force passwordattacks bymakingthemcomputationallyimpractical.
If there is any issue at setup or connection contact support@k21technologies.com
 PublickeycryptographyusesaPUBLIC KEY to encrypt data and a PRIVATEKEY to decryptit.
It will promptabove tomentionthe file where thesekeysshouldbe stored,tokeepitsdefaultdirectory
justpress "Enter". The defaultlocationwill be /root/.ssh/directory
Nowit will askforpassphrase, whichwillbe usedinsteadof password.The passphrase will onlybe
askedonce persession.Enteryourdesired passphrase twice asshownonnextpage,andpressenter
Okaynow our keysare successfullygenerated,goto/root/.ssh/directoryandcheckfor the keys.
The id_rsa isa private keyand id_rsa.pub isthe publickeywhichwill be usedlatertomake password
lesslogin
Copyingthe publickeyonclientsystem(some otherserver/node)
to copy the server'spublickeyinthe clientsystem,the commandis
If there is any issue at setup or connection contact support@k21technologies.com
#ssh-copy-id -i<publickeylocation><clientsIPaddress>(oruser@ clientIP)
#ssh-copy-id -i/root/.ssh/id_rsa.pub 192.168.10.95
=============End of the Activity 11 Guide========

More Related Content

PPTX
Linux – getting started
PDF
Pu t ty
DOCX
How to set up ssh keys on ubuntu
DOCX
My bro procedure
PDF
Manual wifislax
ODP
PDF
Nachos3 - Theoretical Part
PDF
Information gathering
Linux – getting started
Pu t ty
How to set up ssh keys on ubuntu
My bro procedure
Manual wifislax
Nachos3 - Theoretical Part
Information gathering

Similar to Administering Remote System in Linux (20)

PDF
2600 v03 n07 (july 1986)
PPTX
SSh_part_1.pptx
PDF
Introduction to Networking | Linux-Unix and System Administration | Docker an...
PPTX
PPT
Remote Login
DOCX
Controlling The Core
PPTX
IWT_PPTfdsfjsdkfhsdfsdfgierufuiwerugfsrgfsdkfsdf.pptx
PDF
Discuss what is SSH and the advantages and disadvantages of using it.pdf
PPT
Module 8 System Hacking
PDF
Windowshadoop
PPT
Remote1
PPTX
Remote Accesserver, Introduction(Part1).pptx
PPTX
Windows Defense101
PPT
Ssh
PDF
SSH.pdf
DOCX
Protect Your Server from Attack with These 15 Tips for VPS hosting security-M...
PPT
By Nithin & group
DOCX
Backtrack Manual Part8
PPT
PowerShell Remoting
PDF
_Hackercool - September 2021.pdf
2600 v03 n07 (july 1986)
SSh_part_1.pptx
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Remote Login
Controlling The Core
IWT_PPTfdsfjsdkfhsdfsdfgierufuiwerugfsrgfsdkfsdf.pptx
Discuss what is SSH and the advantages and disadvantages of using it.pdf
Module 8 System Hacking
Windowshadoop
Remote1
Remote Accesserver, Introduction(Part1).pptx
Windows Defense101
Ssh
SSH.pdf
Protect Your Server from Attack with These 15 Tips for VPS hosting security-M...
By Nithin & group
Backtrack Manual Part8
PowerShell Remoting
_Hackercool - September 2021.pdf
Ad

More from Mohammed Yazdani (8)

DOCX
Installing webmin on linux
DOCX
Configuring vnc server in linux
DOCX
Overview on Linux
PDF
Network configuration in Linux
PDF
User and group administration in Linux
PDF
Solaris 10 installation on vmware
PDF
Backup and restore in linux
PDF
Installation of Oracle Linux 5.4 32 bit on vmware
Installing webmin on linux
Configuring vnc server in linux
Overview on Linux
Network configuration in Linux
User and group administration in Linux
Solaris 10 installation on vmware
Backup and restore in linux
Installation of Oracle Linux 5.4 32 bit on vmware
Ad

Recently uploaded (20)

PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
Modernising the Digital Integration Hub
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Architecture types and enterprise applications.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
STKI Israel Market Study 2025 version august
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Configure Apache Mutual Authentication
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
OpenACC and Open Hackathons Monthly Highlights July 2025
Modernising the Digital Integration Hub
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Convolutional neural network based encoder-decoder for efficient real-time ob...
Architecture types and enterprise applications.pdf
A review of recent deep learning applications in wood surface defect identifi...
NewMind AI Weekly Chronicles – August ’25 Week III
Getting started with AI Agents and Multi-Agent Systems
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
sbt 2.0: go big (Scala Days 2025 edition)
A proposed approach for plagiarism detection in Myanmar Unicode text
Enhancing emotion recognition model for a student engagement use case through...
STKI Israel Market Study 2025 version august
1 - Historical Antecedents, Social Consideration.pdf
Chapter 5: Probability Theory and Statistics
Configure Apache Mutual Authentication

Administering Remote System in Linux

  • 1. If there is any issue at setup or connection contact support@k21technologies.com Overview of Unix Activity Guide11 [Edition 1] [Last Update 130815] For any issues/help contact : support@k21technologies.com
  • 2. If there is any issue at setup or connection contact support@k21technologies.com Administering Remote System There are couple of waysthat youcan access a shell(commandline) remotelyonmostLINUX/UNIX systems.One of the olderwaysisto use the telnetprogram, whichis available onmostnetworkcapable operatingsystems.Accessingashell accountthroughthe telnetmethodthoughposesadangerinthat everythingthatyousendorreceive overthattelnetsessionisvisibleinplaintexton yourlocal network, and the local networkof the machine youare connectingto.Soanyone whocan "sniff"the connection inbetweencansee yourusername,password,email thatyouread,andcommandthat yourun. For these reasonsyouneedamore sophisticated programthantelnettoconnecttoa remote host. SSH, whichisan acronymfor secure shell,wasdesignedandcreatedtoprovide the bestsecuritywhen accessinganothercomputerremotely,Notonlydoesitencryptthe session,italsoprovidesbetter authenticationfacilities. SSH configurationfile is /etc/ssh/sshd_config SSH daemonor service is sshd Accessingthe remote machine using ssh Syntax: ssh<ip address/ host name ofremote machine> Note:hostname canonlybe usedwhenthe hostname issavedin/etc/hostsfile or,if DNSisconfigured The firsttime aroundit will askyouif you wishtoadd the remote hostto a listof known_hosts,go aheadand say yes Enter the passwordof the remote systemcorrectly,onnce loggedincheckhostname andipaddressto confirmlogin.
  • 3. If there is any issue at setup or connection contact support@k21technologies.com To leave the session,justtype exitorlogoutcommandandyouwill be back to your ownmachine throughwhichyouare loggedin PasswordlessloginusingSSHKeys  As a systemadmin,one personwillbe assignedtomanage manysystems,forexampleone person hasto manage more than10 systemsat a time.Inthissituationadminhas to transfer some filesfromone systemtoanother9 systemsorvice versa,foreveryloginonremote system it will promptforpassword.Evenfortransferringfilesforeverytransferwe needtoenterthe password.  Above situationwill be be veryannoying forsystemadmintotype passwordforeverystep. therefore SSHprovidesabestwayto escape passwordpromptingeverynow andthen.  By generatingSSHkeys,apublickeyandaprivate key,anadmincancopy the publickeyinto othersystemanddone,itwill workas authorizedaccessfromthe admin'ssystem.Now wheneverwe are loggingfromadmin'ssystemtoothersysteminwhichwe have storedthe publickeyof admin'ssystem,itwill notpromptusfor passwordandwe can loginto that system as many time as we want withoutbeingpromptforthe password.  SSH keysare an implementationof public-keycryptography.Theysolvethe problemof brute- force passwordattacks bymakingthemcomputationallyimpractical.
  • 4. If there is any issue at setup or connection contact support@k21technologies.com  PublickeycryptographyusesaPUBLIC KEY to encrypt data and a PRIVATEKEY to decryptit. It will promptabove tomentionthe file where thesekeysshouldbe stored,tokeepitsdefaultdirectory justpress "Enter". The defaultlocationwill be /root/.ssh/directory Nowit will askforpassphrase, whichwillbe usedinsteadof password.The passphrase will onlybe askedonce persession.Enteryourdesired passphrase twice asshownonnextpage,andpressenter Okaynow our keysare successfullygenerated,goto/root/.ssh/directoryandcheckfor the keys. The id_rsa isa private keyand id_rsa.pub isthe publickeywhichwill be usedlatertomake password lesslogin Copyingthe publickeyonclientsystem(some otherserver/node) to copy the server'spublickeyinthe clientsystem,the commandis
  • 5. If there is any issue at setup or connection contact support@k21technologies.com #ssh-copy-id -i<publickeylocation><clientsIPaddress>(oruser@ clientIP) #ssh-copy-id -i/root/.ssh/id_rsa.pub 192.168.10.95 =============End of the Activity 11 Guide========