Chapter 3. Remote connectivity: Safely accessing networked machines
This chapter covers
- Encryption and secure remote connections
- Linux system process management with systemd
- Extra secure and convenient password-free SSH access
- Safely copying files between remote locations with SCP
- Using remote graphic programs over SSH connections
They say that half the fun is getting there. Well, when it comes to working in a distributed computing world, not being able to get to your servers and remote resources is pretty much a show stopper. Because so much of the workload these days is being carried by the kind of virtual machine you saw in the last chapter, and because you can’t just walk up to a virtual server, push the power button, and log in, you’ll need some other access route. Welcome to the world of the Secure Shell (SSH).
In the beginning, there was Telnet for login connections over a network at any rate. The Telnet protocol was fast and reliable and, in an innocent world made up of smaller and simpler networks, perfectly serviceable. Back then, the fact that Telnet sessions sent their data packets without encryption wasn’t a big deal.