Friday, August 8, 2014

Secure Shell In Hostgator

By Dhruv Patel


When a user requires a secure connection to login and execute commands over an unsecured network, such as when communicating with a server, a network protocol that encrypts data, such as SSH (Secure Shell), is enabled. A client specific SSH program running on a client machine can establish a secure connection to a server that is running a server specific SSH program. All web hosting accounts will have hostgator ssh enabled by default.

A shell environment that limits the user to their own top level directory, or an emulation of the root directory, is called a jailed shell. Jailed SSH is offered on all HostGator shared web hosting accounts and requires a connection via port 2222 to the SSH enabled host server, and login details to access a control panel. Jailed shell environments are useful for setting access permissions for all users on the system, such as allowing certain users to execute some commands while restricting others.

Web hosting reseller accounts also have jailed SSH as a free service on all primary domains. There's a small fee for each additional SSH enabled sub-account, each with a separate control panel. Connection to the SSH server uses port 2222 and authenticates with a username and password to access the control panel.

A VPS, or virtual private server, is a virtual machine provided as a service by HostGator. VPS hosting, along with dedicated server hosting, where the customer has an entire server not shared with other customers, provides automatic SSH access to their root directory with full permission to make any changes they want on their own server. This kind of hosting requires port 22 to connect securely to the server, the username 'root' and a web host manager password.

The SSH protocol is most commonly used on Unix based systems, though can also be used with Windows. Unlike other unsecured shell protocols, SSH does not send password and other sensitive information as plain text, which can be easily intercepted. This encryption protocol used by HostGator ensures confidentiality and data integrity over the internet.

SSH is most commonly used to log into web hosting accounts and execute commands, but it also supports tunneling, which carries protocol information over an incompatible network or a secure path through an untrusted network, port forwarding to redirect packets of data, transferring files securely using SSH file transfer protocol (SFTP) or secure copy (SCP) protocol, and many other uses.

SSH authentication on server and client HostGator accounts uses the public-key cryptography algorithm, which generates a pair of keys - one private key and one public key. These two keys share a mathematical similarity, even though they are different. SSH may generate public-private key pairs automatically for encrypting a network connection, requiring the client to authenticate with a password. Public-private key pairs may also be generated manually, in which case the user does not need a password to authenticate.

Cloud-based networks are generally unsuitable environments for the safe transmission of data. SSH offers a secure way of connecting through any unsecured network, and is enabled free on all HostGator accounts or primary domains, including shared, reseller, dedicated server and VPS accounts.




About the Author:



No comments:

Post a Comment