Skip to main content

remote commands telnet ssh


Linux/Unix SSH, Telnet Remote Commands



Comparison Chart



Basis 

Telnet
SSH
Security
Less secured
Highly secured
port 
23


22

Data format
Telnet sends the
 data
 in plain text.

Encrypted format is used to send data and also uses a secure channel.

Authentication


No privileges are
 provided for
users authentication.

Uses public 
key encryption
for authentication.


Suitability of 
network


Private networks
 are recommended.

Suitable for 
Public networks.
Vulnerabilities
Vulnerable to
 security attacks.


SSH has overcome many security
 issues of telnet.


Bandwidth 
Usage
Low

High



Rlogin:
  1. SSH traffic is encrypted while Rlogin traffic is not
  2. SSH authenticates the user while Rlogin does not
  3. SSH can be used for automation while Rlogin cannot
  4. Rlogin is no longer being used in favor of SSH

telnet

The telnet command allows you to communicate to another host using the TELNET protocol.
The telnet command is used for interactive communication with another host using the TELNET protocol. It begins in command mode, where it prints a telnet command prompt("telnet>").

If telnet is invoked with a host argument, it performs an open command implicitly (see the Commands section below for details).




SSH:

SSH which stands for Secure Shell, It is used to connect to a remote computer securely. Compare to Telnet, SSH is secure wherein the client /server connection is authenticated using a digital certificate and passwords are encrypted. Hence it's widely used by system administrators to control remote Linux servers.
The syntax to log into a remote Linux machine using SSH is
SSH username@ip-address or hostname

Once you are logged in, you can execute any commands that you do in your terminal
Linux's ssh command allows you to log into and work on a remote computer, which can be located anywhere in the world. The command (syntax: ssh hostname) opens a window on your local machine through which you can run and interact with programs on the remote machine just as if it were right in front of you. You can use the remote computer's software, access its files, transfer files, and more.
An ssh session is encrypted and requires authentication.​ Ssh stands for Secure SHell, referring to the operation's inherent security.

Usage Examples

To log into a computer with the network id comp.org.net and username jdoe, you'd use the following command:
ssh jdoe@comp.org.net
If the username of the remote machine is the same as on the local machine, you can omit the username in the command:
ssh comp.org.net
You'll then get a message something like this:
The authenticity of host 'sample.ssh.com' cannot be established. DSA key fingerprint is 04:48:30:31:b0:f3:5a:9b:01:9d:b3:a7:38:e2:b1:0c. Are you sure you want to continue connecting (yes/no)?
Entering yes tells the machine to add the remote computer to your list of known hosts (~/.ssh/known_hosts). You'll see a message such as this:
Warning: Permanently added 'sample.ssh.com' (DSA) to the list of known hosts.
Once you're connected, you'll be prompted for a password. After you enter it, you'll get the shell prompt for the remote machine.
You also can use ssh to run a command on a remote machine without logging in.
For example, ssh jdoe@comp.org.net ps will execute the command ps on the computer comp.org.net and show the results in your local window.

SSH or Secure Shell daemon is a network protocol that is used to perform remotely secured log ins to Linux systems via a secured channel through unsecured networks using strong cryptography.
One of the most basic utility of SSH protocol is the ability to access Unix shells on remote Linux machines and execute commands. However, SSH protocol can offer other implementations, such as the ability to create secured TCP tunnels over the protocol, to remotely and securely transfer files between machines or to act as a FTP like service.
The standard port used by SSH service is 22/TCP. However, you might want to change SSH default port in your Linux server, in order to achieve some kind of security through obscurity because the standard 22/TCP port is continuously targeted for vulnerabilities by hackers and bots in internet.
To change SSH service default port in Linux, first you need to open the main SSH daemon configuration file for editing with your favorite text editor by issuing the below command and make the following changes.
# vi /etc/ssh/sshd_config

In sshd_config file, search and comment the line that begins with Port 22, by adding a hashtag (#) in front of the line. Below this line, add a new port line and specify your desired port to bind SSH.
In this example, we’ll configure SSH service to bind and listen on port 34627/TCP. Make sure you choose a random port, preferably higher than 1024 (the superior limit of standard well-known ports). The maximum port that can be setup for for SSH is 65535/TCP.
#Port 22
Port 34627
After you’ve made the above changes, restart the SSH daemon to reflect changes and issue netstat or ss command to confirm that SSH service listens on the new TCP port.
# systemctl restart ssh
# netstat -tlpn| grep ssh
# ss -tlpn| grep ssh


Comments

Popular posts from this blog

sed

Sed Command in Linux/Unix with examples SED command in UNIX is stands for stream editor and it can perform lot’s of function on file like, searching, find and replace, insertion or deletion. Though most common use of SED command in UNIX is for substitution or for find and replace. By using SED you can edit files even without opening it, which is much quicker way to find and replace something in file, than first opening that file in VI Editor and then changing it. o     SED is a powerful text stream editor. Can do insertion, deletion, search and replace(substitution). o     SED command in unix supports regular expression which allows it perform complex pattern matching. Syntax: sed OPTIONS... [SCRIPT] [INPUTFILE...] Example: Consider the below text file as an input. $cat > geekfile.txt unix is great os. unix is opensource. unix is free os. learn operating system. unixlinux which one you choose. unix is easy to learn.unix ...

initramfs" file is deleted or corrupted on your RHEL or CentOS 7

Initrd/Initramfs image provides the capability to load a RAM disk by the boot loader. This RAM disk can then be mounted as the root filesystem and programs can be run from it. Afterwards, a new root file system can be mounted from a different device. The previous root filesystem which was mounted from initrd/initramfs is then moved to a directory and can be subsequently unmounted. Their are chances that either you might have accidentally deleted "initramfs" file from the /boot partition or it is corrupted due to some reason.  Then boot process will get interrupted and you will see below error: error: file '/initramfs-3.10.0-957.el7.x86_64.img' not found. Good news is you can still recover this "initramfs" by following below steps: Step 1 :  Mount RHEL or CentOS 7 ISO image on your physical server and boot from it. In case you are using HPE Prolient server you can mount this ISO image on iLO, if this is virtual environment then mount it accordingly and reboot...

nw commands

troubleshoot commands in Linux.   1. ifconfig ifconfig (interface configurator) command   is use to initialize an interface, assign IP  Address to interface and enable or disable  interface on demand. With this command  you can view IP Address and Hardware / MAC   address assign to interface and also MTU (Maximum transmission unit) size. # ifconfig   eth0       Link encap:EthernetHWaddr 00:0C:29:28:FD:4C inet addr:192.168.50.2   Bcast:192.168.50.255   Mask:255.255.255.0           inet6 addr: fe80::20c:29ff:fe28:fd4c/64 Scope:Link           UP BROADCAST RUNNING MULTICAST   MTU:1500   Metric:1           RX packets:6093 errors:0 dropped:0 overruns:0 frame:0  ...
# # #