1. SSH, SCP and SFTP |
Cosmos and Eric should be accessed via SSH, SCP and SFTP. SSH and friends are a protocol suite of network connectivity tools that encrypt all traffic, including passwords, in order to eliminate eavesdropping, connection hijacking, and other network-level attacks.
SSH, SCP and SFTP clients may be freely downloaded from the Internet (see details below) for both MS Windows and Unix (Solaris and Linux), though most (all?) Linux distributions comes with an SSH client already installed.
SSH, or the Secure Shell, is roughly-speaking, encrypted Telnet, i.e., offers a secure method of logging on to a remote machine; SCP and SFTP offer secure methods of copying files to and from remote machines, SFTP being similar in functionality and usage to the more familiar FTP.
For each client mentioned below, the number is given of a version which is known to authenticate to Cosmos and Eric successfully; it is expected that later versions will also work.
There are two SSH (and SCP/SFTP) clients which are in common use: that from SSH Communications Security and the OpenSSH client. Both are simple but effective command-line utilities.
This client is available for free download from www.ssh.com (follow the links to: Download, Secure Shell for Workstations, Non-commerical downloads): the source is available so that binaries can be compiled up for Linux and Solaris (experience shows that the source builds with no problems using GCC via the usual three steps, ./configure, make and make install).
The default authentication configuration may need to be changed (either to prevent authentication attempts by a method which will fail, or to ensure that the correct method is attempted). The configuration is usually contained within /etc/ssh2/ssh2_config --- change this
AllowedAuthentications publickey,password(or similar) to this
AllowedAuthentications publickey,keyboard-interactive,password
local_prompt> ssh <remotehost> -l <username_on_remotehost>for example
powell> ssh cosmos.umist.ac.uk -l mnopqrs1 PAM authentication Password: Last login: Tue Dec 10 2002 09:50:52 from powell.csu.umist. ... ... cosmos>The first time you connect via ssh you may see something like this:
The authenticity of host 'cosmos (130.88.99.10)' can't be established. DSA key fingerprint is 1f:eb:8b:2a:6c:38:04:30:ea:b9:e2:12:db:53:d9:7c. Are you sure you want to continue connecting (yes/no)?Assuming you believe that you have truly connected to cosmos, then answer yes! You will not see this question again.
local_prompt> scp <file_to_send> <[email protected]>:<remote_path>/<remote_filename>for example
talby> scp printtest.txt.ps [email protected]:tmp warning: Need basic cursor movement capability, using vt100 . . Keyboard-interactive: PAM authentication Password: printtest.txt.ps | 15kB | 15.4 kB/s | TOC: 00:00:01 | 100% talby>
local_prompt> sftp <[email protected]><remotehost>For example:
talby> sftp [email protected] Warning: Need basic cursor movement capability, using vt100 . . Keyboard-interactive: PAM authentication Password: sftp>Once authenticated, sftp behaves, from the user point of view, just like any other FTP client.
The first time you connect you may see something like this:
...Host key not found from database. Key fingerprint: xilim-dukat-focam-havac-curuf-fosur-nyvac-bedef-rugys-zaler-byxex You can get a public key's fingerprint by running % ssh-keygen -F publickey.pub on the keyfile. Are you sure you want to continue connecting (yes/no)?Responding with yes results in the
Host key saved to /home/isd/.ssh2/hostkeys/key_22_cosmos.umist.ac.uk.pub host key for cosmos.umist.ac.uk, accepted by isd Thu Mar 20 2003 13:19:44You will not see this again.
This client is available for free download from www.openssh.org: binaries in RPM format are available for Linux; in addition the source is available so that binaries can be compiled up for Solaris. Binaries are also available from the RedHat site and its mirrors. Solaris binaries are available from sunfreeware.com.
Usage is as for the SSH Communications Security client.
The configuration is usually contained within /etc/ssh/ssh_config. According to the man page, the default authentication methods are, in order, hostbased, publickey, keyboard-interactive and password. Should the client initially attempt authentication by a method which fails, or fail to authenticate, edit the configuration file to change the defaults to include keyboard-interactive is tried and tried before failing methods, e.g:
Host * ForwardX11 yes PreferredAuthentications publickey,keyboard-interactive
For more information see the man pages at the OpenSSH website.
This client is available for free download from www.ssh.com. The default configured authentication method will fail --- choose keyboard-interactive.
This client is available from free download from www.chiark.greenend.org.uk. The default configured authentication method will fail --- choose keyboard-interactive
...cont's | next... |