![Novell LINUX ENTERPRISE DESKTOP 11 Скачать руководство пользователя страница 176](http://html1.mh-extra.com/html/novell/linux-enterprise-desktop-11/linux-enterprise-desktop-11_manual_1711827176.webp)
14.2 The ssh Program
Using the ssh program, it is possible to log in to remote systems and work interactively.
It replaces both telnet and rlogin. The slogin program is just a symbolic link pointing
to ssh. For example, log in to the host sun with the command
ssh sun
. The host then
prompts for the password on sun.
After successful authentication, you can work on the remote command line or use inter-
active applications, such as YaST. If the local username is different from the remote
username, you can log in using a different login name with
ssh -l augustine
sun
or
ssh augustine@sun
.
Furthermore, ssh offers the possibility to run commands on remote systems, as known
from rsh. In the following example, run the command
uptime
on the host sun and
create a directory with the name
tmp
. The program output is displayed on the local
terminal of the host jupiter.
ssh otherplanet "uptime; mkdir tmp"
Password:
1:21pm
up
2:17,
9 users,
load average: 0.15, 0.04, 0.02
Quotation marks are necessary here to send both instructions with one command. It is
only by doing this that the second command is executed on sun.
14.3 scp—Secure Copy
scp copies files to a remote machine. It is a secure and encrypted substitute for rcp. For
example,
scp MyLetter.tex sun:
copies the file
MyLetter.tex
from the host
jupiter to the host sun. If the username on jupiter is different than the username on sun,
specify the latter using the
username@host
format. The
-l
option has a different
meaning for this command.
After the correct password is entered, scp starts the data transfer and shows a growing
row of asterisks to simulate a progress bar. In addition, the program displays the esti-
mated time of arrival to the right of the progress bar. Suppress all output by giving the
option
-q
.
162
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......