In various tutorials throughout the history of LearnLinuxTV, we’ve gone over the importance of using public keys with OpenSSH. But what do you do when you have multiple clients you work with, how do you manage keys between them? In this video, we’ll go through an example scenario where we have three clients, and we need to maintain multiple SSH keys for each.
In episode 35 of The Homelab Show, Jay and Tom discuss the essentials of OpenSSH. OpenSSH itself is the standard for remote management in Linux, and it’s the most convenient way of managing servers without having to stand in front of the rack. Of course, with great power comes great responsibility, so core security topics surrounding OpenSSH are covered as well.
The OpenSSH client config file is a very powerful feature, that too many people ignore. You can use the client config file to simplify your SSH connections, by including preset options per host. In this video, I’ll go over the basics of this config file.
Setting up a Bastion Server can be a useful method of gaining access to your Homelab from external networks. In addition, it’s also a popular attack target for intruders. In this episode, Tom and Jay discuss what a Bastion Server is, and some recommended adjustments to help make it more secure.
Thanks to Linode for sponsoring this episode.
Public Key Authentication with OpenSSH is preferred, as it’s a much stronger method of authenticating to your servers when compared to using password authentication. In fact, password authentication in OpenSSH should always be disabled. But before you can password authentication, you’ll need to set up public key authentication, and that’s exactly what we’ll do in today’s video.