SSH is ubiquitous, so it's important to secure it. Find out how to use cryptographic key pairs to enhance security.
- [Instructor] SSH is an important service on your network.…It provides remote access to servers and clients alike.…In this video we'll take a look at securing the SSH service…to only allow users to log in…with a key rather than with a password,…which might be guessed by an attacker.…When we first installed the open SSH server package…it's configured to allow access using passwords.…In order to switch this feature off…and enable logging in with a key instead,…we need to take two primary steps.…We need to generate a key pair…or get a public key from users who will be logging in…using their keys,…and then we'll edit the configuration of an SSH server…to allow key log in only.…
First I'll generate a key pair.…A key pair is a set of files…that represent a private key and a public key.…Together these files allow SSH to verify…that the user connecting is who they say they are.…The user still needs to have an account on the server,…but instead of using the account password to log in,…the key takes its place.…We'll send the public key to the server…
- Name the tool that is often used to find out what ports are open on a remote server.
- Explain what a firewall will do without any additional configuration.
- Identify what you append a rule to in iptables.
- Explain what needs to be added to a site to allow the use of HTTPS.
- List the two components of a keypair.