{"id":66,"date":"2013-04-01T00:55:36","date_gmt":"2013-04-01T05:55:36","guid":{"rendered":"https:\/\/www.softwareab.net\/wordpress\/?p=66"},"modified":"2013-05-01T13:50:23","modified_gmt":"2013-05-01T18:50:23","slug":"quick-primer-on-ssh","status":"publish","type":"post","link":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/","title":{"rendered":"Quick Primer on SSH&#8230;"},"content":{"rendered":"<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">Here&#8217;s an oldie but goodie! I have to solve this problem of sharing sensitive information with other folks safely frequently. In our organization, we use not so much a really expensive cryptosystem as an <\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">internal<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\"> system. That is, we&#8217;re a Microsoft ActiveDirectory shop so we get a CA for the cost of the server license and we use that to generate keys. From an email point of view, Exchange allows us to sign mail messages with the receiver&#8217;s public key and that seems to work well with the Government \/ DoD customers. So the real question seems to be if I wanted to setup secure communications with someone who was using just plain old hotmail or gmail. (That&#8217;s my take, at least.)<!--more--><\/span><\/p>\n<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">I think we see where this question is going: that&#8217;s right, we want to talk about PGP (&#8220;Pretty Good Privacy&#8221; and establishing a little Web of Trust. So let&#8217;s take that as read: we both pull down PGP, generate a keypair, and then we have to work out how we <\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">authoritatively<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\"> setup the public key exchanges (since we don&#8217;t have a PKI). We can use the root server that Dr. Kabay listed to perform this exchange, and that&#8217;s the hard part (done!). From that point on, we sign \/ encrypt messages as per usual (sign with our private key, encrypt with the receiver&#8217;s public key) and we have our secure message transfer.<\/span><\/p>\n<p>Let&#8217;s go one step further and say that I want to expose secure access to a system with someone external to my organization. To keep this in scope with the question, let&#8217;s say I want to setup a secure drop box we can exchange clever witticisms from (that&#8217;s communications of a sort, at least). Here&#8217;s how I&#8217;d do it (remember, this is all on Windoze, not *NIX):<\/p>\n<ol>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\">On my side, download Cygwin and install the OpenSSH package.Then use <\/span><b style=\"line-height: 1.714285714; font-size: 1rem;\">ssh-host-config<\/b><span style=\"line-height: 1.714285714; font-size: 1rem;\"> to setup the <\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">sshd <\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\">daemon and install it as a service. Run the sshd service (preferably on a non-standard port, but that will probably not be allowed by your firewall policy).<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\">Create a <\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">local<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\"> account for the person I want to let in. Not a domain account, not a privileged account, just an account with minimal privileges but allowed to login (\u00e2\u20ac\u0153Access this computer from the network\u00e2\u20ac\u009d user right). Give that local account a very strong password (for example, Steve Gibson has a great generator you can use below). After all, this password will never be used directly.<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\">Use the <\/span><b style=\"line-height: 1.714285714; font-size: 1rem;\">mkpasswd -l | grep [local_user] &gt;&gt; \/etc\/passwd<\/b><span style=\"line-height: 1.714285714; font-size: 1rem;\"> command to create a mapping between the account I want to grant access and the Cygwin pseudo-UNIX environment.<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\">Modify <\/span><b style=\"line-height: 1.714285714; font-size: 1rem;\">\/etc\/sshd_config<\/b><span style=\"line-height: 1.714285714; font-size: 1rem;\"> to reference a nice, scary logon banner, specify the <\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">AllowUsers<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\"> and set <\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">PasswordAuthenticate<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\"> to \u00e2\u20ac\u0153no.\u00e2\u20ac\u009d<\/span><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\">Tell my counterpart to download the complete Putty package (see below). Use <\/span><i style=\"line-height: 1.714285714; font-size: 1rem;\">puttygen<\/i><span style=\"line-height: 1.714285714; font-size: 1rem;\"> to generate a strong keypair (say 2048 bits, SSH-2 RSA even though Dr. Kabay indicates RSA is not the latest).<\/span><br \/>\n<a href=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-67\" alt=\"puttygen\" src=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg\" width=\"300\" height=\"288\" srcset=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg 300w, https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen.jpg 483w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/li>\n<li><span style=\"line-height: 1.714285714; font-size: 1rem;\">Have my counterpart send me the public key from puttygen. That should occur out-of-band, but I&#8217;m thinking that we can do this pretty easily, I&#8217;ll have him encrypt the message with a secret key that we agree to on the phone.<\/span><\/li>\n<li>On my new user&#8217;s home directory, create the requisite <b>.ssh<\/b> directory and <b>cat<\/b> the received public key into the <i>authorized_keys2<\/i> file. Now the SSH daemon, when presented with my new user&#8217;s logon ID, will automatically challenge based on that key (that&#8217;s how we get the public key protection).<\/li>\n<\/ol>\n<p>My new user can now logon to my SSH server using public key, and all for free! Have her use the Putty SCP (Secure CoPy) to be able to transfer files to our drop box (my new user has write privileges only to her local home directory, and read privileges for very little else).<\/p>\n<p>Here&#8217;s a picture of my using (free!) public key support to login to my own box (localhost):<br \/>\n<a href=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/ssh_access.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-68\" alt=\"ssh_access\" src=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/ssh_access-300x168.jpg\" width=\"300\" height=\"168\" srcset=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/ssh_access-300x168.jpg 300w, https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/ssh_access-624x351.jpg 624w, https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/ssh_access.jpg 908w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><b><i>References:<\/i><\/b><\/p>\n<p>\u00e2\u20ac\u0153PGP Desktop Trial Software (Client Only)\u00e2\u20ac\u009d &#8211; <a href=\"http:\/\/www.pgp.com\/downloads\/desktoptrial\/desktoptrial2.html\">http:\/\/www.pgp.com\/downloads\/desktoptrial\/desktoptrial2.html<\/a><\/p>\n<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">\u00e2\u20ac\u0153GNU + Cygnus + Windows = cygwin\u00e2\u20ac\u009d &#8211; <\/span><a style=\"line-height: 1.714285714; font-size: 1rem;\" href=\"http:\/\/www.cygwin.com\/\">http:\/\/www.cygwin.com\/<\/a><\/p>\n<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">\u00e2\u20ac\u0153Putty: a free telnet\/ssh client\u00e2\u20ac\u009d &#8211; <\/span><a style=\"line-height: 1.714285714; font-size: 1rem;\" href=\"http:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/\">http:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/<\/a><\/p>\n<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">\u00e2\u20ac\u0153Perfect Passwords &#8211; GRC&#8217;s Ultra High Security Password Generator\u00e2\u20ac\u009d &#8211; <\/span><a style=\"line-height: 1.714285714; font-size: 1rem;\" href=\"https:\/\/www.grc.com\/passwords.htm\">https:\/\/www.grc.com\/passwords.htm<\/a><span style=\"line-height: 1.714285714; font-size: 1rem;\">. Steve Gibson is a legend in the PC security industry. Read his site, he&#8217;s got a lot of thought-provoking articles.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s an oldie but goodie! I have to solve this problem of sharing sensitive information with other folks safely frequently. In our organization, we use not so much a really expensive cryptosystem as an internal system. That is, we&#8217;re a &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"more-link\" href=\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\"> <span class=\"screen-reader-text\">Quick Primer on SSH&#8230;<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[25,24],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quick Primer on SSH... - softwareab<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Primer on SSH... - softwareab\" \/>\n<meta property=\"og:description\" content=\"Here&#8217;s an oldie but goodie! I have to solve this problem of sharing sensitive information with other folks safely frequently. In our organization, we use not so much a really expensive cryptosystem as an internal system. That is, we&#8217;re a &hellip; Quick Primer on SSH&#8230; Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\" \/>\n<meta property=\"og:site_name\" content=\"softwareab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-01T05:55:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-05-01T18:50:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg\" \/>\n<meta name=\"author\" content=\"Andrew Bruce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:site\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Bruce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\"},\"author\":{\"name\":\"Andrew Bruce\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"headline\":\"Quick Primer on SSH&#8230;\",\"datePublished\":\"2013-04-01T05:55:36+00:00\",\"dateModified\":\"2013-05-01T18:50:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\"},\"wordCount\":732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"image\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg\",\"keywords\":[\"remote access\",\"ssh\"],\"articleSection\":[\"Teknocratica\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\",\"name\":\"Quick Primer on SSH... - softwareab\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg\",\"datePublished\":\"2013-04-01T05:55:36+00:00\",\"dateModified\":\"2013-05-01T18:50:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen.jpg\",\"contentUrl\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen.jpg\",\"width\":483,\"height\":464},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareab.net\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"remote access\",\"item\":\"https:\/\/www.softwareab.net\/wordpress\/tag\/remote-access\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Quick Primer on SSH&#8230;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/\",\"name\":\"softwareab\",\"description\":\"Technocratica, Technopolitik, Technophobia\",\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\",\"name\":\"Andrew Bruce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"contentUrl\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"width\":400,\"height\":330,\"caption\":\"Andrew Bruce\"},\"logo\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\"},\"description\":\"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!\",\"sameAs\":[\"http:\/\/cloudraticsolutions.net\/\",\"https:\/\/www.facebook.com\/cloudraticsolutions\/\",\"https:\/\/twitter.com\/realcloudratics\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quick Primer on SSH... - softwareab","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/","og_locale":"en_US","og_type":"article","og_title":"Quick Primer on SSH... - softwareab","og_description":"Here&#8217;s an oldie but goodie! I have to solve this problem of sharing sensitive information with other folks safely frequently. In our organization, we use not so much a really expensive cryptosystem as an internal system. That is, we&#8217;re a &hellip; Quick Primer on SSH&#8230; Read More &raquo;","og_url":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/","og_site_name":"softwareab","article_publisher":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_author":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_published_time":"2013-04-01T05:55:36+00:00","article_modified_time":"2013-05-01T18:50:23+00:00","og_image":[{"url":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg"}],"author":"Andrew Bruce","twitter_card":"summary_large_image","twitter_creator":"@realcloudratics","twitter_site":"@realcloudratics","twitter_misc":{"Written by":"Andrew Bruce","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#article","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/"},"author":{"name":"Andrew Bruce","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"headline":"Quick Primer on SSH&#8230;","datePublished":"2013-04-01T05:55:36+00:00","dateModified":"2013-05-01T18:50:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/"},"wordCount":732,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"image":{"@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg","keywords":["remote access","ssh"],"articleSection":["Teknocratica"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/","url":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/","name":"Quick Primer on SSH... - softwareab","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage"},"image":{"@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen-300x288.jpg","datePublished":"2013-04-01T05:55:36+00:00","dateModified":"2013-05-01T18:50:23+00:00","breadcrumb":{"@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#primaryimage","url":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen.jpg","contentUrl":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/04\/puttygen.jpg","width":483,"height":464},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareab.net\/wordpress\/quick-primer-on-ssh\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareab.net\/wordpress\/"},{"@type":"ListItem","position":2,"name":"remote access","item":"https:\/\/www.softwareab.net\/wordpress\/tag\/remote-access\/"},{"@type":"ListItem","position":3,"name":"Quick Primer on SSH&#8230;"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareab.net\/wordpress\/#website","url":"https:\/\/www.softwareab.net\/wordpress\/","name":"softwareab","description":"Technocratica, Technopolitik, Technophobia","publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600","name":"Andrew Bruce","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","contentUrl":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","width":400,"height":330,"caption":"Andrew Bruce"},"logo":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/"},"description":"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!","sameAs":["http:\/\/cloudraticsolutions.net\/","https:\/\/www.facebook.com\/cloudraticsolutions\/","https:\/\/twitter.com\/realcloudratics"]}]}},"_links":{"self":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/66"}],"collection":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":4,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/66\/revisions"}],"predecessor-version":[{"id":222,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/66\/revisions\/222"}],"wp:attachment":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/media?parent=66"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/categories?post=66"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/tags?post=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}