Chapter 3. Remote connectivity: Safely accessing networked machines

 

This chapter covers

  • Encryption and secure remote connections
  • Linux system process management with systemd
  • Extra secure and convenient password-free SSH access
  • Safely copying files between remote locations with SCP
  • Using remote graphic programs over SSH connections

They say that half the fun is getting there. Well, when it comes to working in a distributed computing world, not being able to get to your servers and remote resources is pretty much a show stopper. Because so much of the workload these days is being carried by the kind of virtual machine you saw in the last chapter, and because you can’t just walk up to a virtual server, push the power button, and log in, you’ll need some other access route. Welcome to the world of the Secure Shell (SSH).

3.1. The importance of encryption

In the beginning, there was Telnet for login connections over a network at any rate. The Telnet protocol was fast and reliable and, in an innocent world made up of smaller and simpler networks, perfectly serviceable. Back then, the fact that Telnet sessions sent their data packets without encryption wasn’t a big deal.

3.2. Getting started with OpenSSH

3.3. Logging in to a remote server with SSH

3.4. Password-free SSH access

3.5. Safely copying files with SCP

3.6. Using remote graphic programs over SSH connections

3.7. Linux process management

Summary

Key terms

Security best practices

Command-line review

Test yourself