07.06.2014 Views

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

2 - Raspberry PI Community Projects

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BACK TO BASICS<br />

Client, server<br />

A system where several processes communicate with each other is oen described<br />

with the “client/server” metaphor. The server is the program that<br />

takes requests coming from a client and executes them. It is the client that<br />

controls operations, the server doesn't take any initiative of its own.<br />

9.2.1. Remote Login: telnet<br />

The telnet protocol, the oldest remote login service, is the worst in terms of security. Data and<br />

passwords are sent in clear text — that is, not encrypted — leaving them vulnerable to anyone<br />

snooping on the network. If necessary, take care to remove this obsolete service, that is no<br />

longer installed by default:<br />

# apt-get remove telnetd<br />

There is, however, an adaptation that corrects its most crippling defects; it uses SSL (Secure<br />

Socket Layer) to authenticate the partner and encrypt communications. The telnetd-ssl and<br />

telnet-ssl packages provide, respectively, the server and client software.<br />

VOCABULARY<br />

Authentication, encryption<br />

When you need to give a client the ability to conduct or trigger actions on a<br />

server, security is important. You must ensure the identity of the client; this<br />

is authentication. This identity usually consists of a password that must be<br />

kept secret, or any other client could get the password. This is the purpose of<br />

encryption, which is a form of encoding that allows two systems to communicate<br />

confidential information on a public channel while protecting it from<br />

being readable to others.<br />

Authentication and encryption are oen mentioned together, both because<br />

they are frequently used together, and because they are usually implemented<br />

with similar mathematical concepts.<br />

9.2.2. Secure Remote Login: SSH<br />

The SSH (Secure Shell) protocol, contrary to telnet, was designed with security and reliability in<br />

mind. Connections using SSH are secure: the partner is authenticated and all data exchanges<br />

are encrypted.<br />

CULTURE<br />

SSH compared to RSH<br />

SSH tools provide secure variants of the programs from the classic RSH (Remote<br />

Shell) family — rsh, rlogin, and rcp. These are still available in the<br />

rsh-server and rsh-client packages, but their usage is strongly discouraged.<br />

SSH also offers two file transfer services. scp is a command line tool that can be used like cp,<br />

except that any path to another machine is prefixed with the machine's name, followed by a<br />

colon.<br />

Chapter 9 — Unix Services<br />

189

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!