vanderkerkoff
March 5th, 2009, 11:56 AM
Sorry to be such a dumb *** but I wanted to clarify something.
I've setup an OpenSSH Ubuntu 8.04 server
ssh -v
OpenSSH_4.7p1 Debian-8ubuntu1.2, OpenSSL 0.9.8g 19 Oct 2007
to not allow password logins, running on a non standard port, created a public/private key pairing with ssh-keygen,, moved the public key onto my MacBook
ssh -v
OpenSSH_5.1p1, OpenSSL 0.9.7l 28 Sep 2006
and now connect to the server from around the world successfully through the terminal window.
Is all the data that I pass from my laptop to the server, such as commands in the terminal window, or file transfers with scp in the terminal, encrypted on my end, and then decrypted at the server? And then is all the data similarly encrypted in the other direction? Or is the only thing that the key pair is used for is initial access to the server itself?
A colleague has suggested setting up VPN and using PPTP to connect, but I was wondering if my setup was an acceptable level of security cpmpared to the VPN.
I've setup an OpenSSH Ubuntu 8.04 server
ssh -v
OpenSSH_4.7p1 Debian-8ubuntu1.2, OpenSSL 0.9.8g 19 Oct 2007
to not allow password logins, running on a non standard port, created a public/private key pairing with ssh-keygen,, moved the public key onto my MacBook
ssh -v
OpenSSH_5.1p1, OpenSSL 0.9.7l 28 Sep 2006
and now connect to the server from around the world successfully through the terminal window.
Is all the data that I pass from my laptop to the server, such as commands in the terminal window, or file transfers with scp in the terminal, encrypted on my end, and then decrypted at the server? And then is all the data similarly encrypted in the other direction? Or is the only thing that the key pair is used for is initial access to the server itself?
A colleague has suggested setting up VPN and using PPTP to connect, but I was wondering if my setup was an acceptable level of security cpmpared to the VPN.