Book Image

Ubuntu 20.04 Essentials

By : Neil Smyth
Book Image

Ubuntu 20.04 Essentials

By: Neil Smyth

Overview of this book

Ubuntu is undeniably one of the most highly regarded and widely used Debian-based Linux distributions available today. Thanks to its ease of use and reliability, Ubuntu has a loyal following of Linux users and an active community of developers. Ubuntu 20.04 Essentials is designed to take you through the installation, use, and administration of the Ubuntu 20.04 distribution in detail. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers, and installing packages and system updates. Additional installation topics such as dual booting with Microsoft Windows are also covered along with crucial security topics such as configuring a firewall and user and group administration. For the experienced user, the book delves into topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, and swap management. Further, it also explores KVM virtualization, Secure Shell (SSH), Linux containers, and file sharing using both Samba and NFS to provide a thorough overview of this enterprise-class operating system.
Table of Contents (38 chapters)
38
Index

18.11 Summary

It is important that any remote access to an Ubuntu system be implemented in a way that provides a high level of security. By default, SSH allows remote system access using password-based authentication. This leaves the system vulnerable to anyone who can either guess a password, or find out the password through other means. For this reason, the use of key-based authentication is recommended to protect system access. Key-based authentication uses the concept of public key encryption involving public and private keys. When implemented, users are only able to connect to a server if they are using a client which has a private key that matches a public key on the server. As an added layer of security, the private key may also be encrypted and password protected. Once key-based encryption has been implemented, the server system is then configured to disable support for the less secure password-based authentication.

This chapter has provided an overview of SSH key-based...