SSH Connections
Introduction to Linux in HPC/SSH Connections
Jump to navigation
Jump to search
Tutorial | |
---|---|
Title: | Introduction to Linux in HPC |
Provider: | HPC.NRW
|
Contact: | tutorials@hpc.nrw |
Type: | Multi-part video |
Topic Area: | HPC Platforms |
License: | CC-BY-SA |
Syllabus
| |
1. Background and History | |
2. The Command Line | |
3. Linux Directory Structure | |
4. Files | |
5. Text display and search | |
6. Users and permissions | |
7. Processes | |
8. The vim text editor | |
9. Shell scripting | |
10. Environment variables | |
11. System configuration | |
12. SSH Connections | |
13. SSH: Graphics and File Transfer | |
14. Various tips |
This tutorial introduces SSH (Secure Shell) as a tool to connect to other Linux machines over a network. It is the most common way to connect to and interact with a cluster. A SSH server is expected to be running on the remote computer, while clients for Linux, Mac OS and Windows are available to establish the connection. This tutorials will teach you how to establish a connection and create a key for public key authentication, which is considered to be the most secure option.
Video
Quiz
What is the correct syntax to open a ssh connection?
Where is your ssh config stored on Linux?
What tools help you with creating and installing a ssh key-pair? (on Linux)
Does it cause a security problem to share an SSH public key with your friends?
Which authentication for SSH login is more secure?
When generating the SSH public/private key pair, is it secure to use empty passphrase?
Info: | Verify the fingerprint of remote host, before the first login. User the SSH public key authentication for login. Never use an empty passphrase for the SSH keys. Use strong passphrase to generate the SSH keys. Keep your private SSH key as top secret. Create, configure and use different SSH keys for different remote hosts. If no X11 application is required, disable X11 forwarding. Otherwise, only enable the untrusted X11 forwarding. |