Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
right now I am learning how to used ssh i have learn how to start sshd server I have learn how to connect to other linux, right now i have a problem using scp command and gftp command
I don't undersatnd what is differnt between shh 1 and shh 2, what is keyscan anywhere
is there a command to see whats going on (the process network)
thanks
ps oh yea i also read the man ssh it give information but don't give how to use it.
ssh2 is an improved protocol, believed to be more secure than ssh1. If you have a choice, always go with ssh2. There is some backwards compatibility in the client anyway.
ssh-keyscan is used to scan the network and find public keys for ssh servers, to keep your list of keys up to date.
I'm not sure what you mean in the rest of your post. What problem are you having with scp/sftp? What do you want to see on the network? You can use a sniffer to view the actual packets (not going to be much use for encrypted data), or you can use the netstat command to see what processes are listening on which ports, and what connections have been made to/from your machine.
by the way how come i can't access a regular user instead of root
this is the command to use ssh -2Xl ipaddress but don't work
i can access by by using root but a user
any ideas
-l requires a username, are you actually doing this:
ssh -2Xl user ipaddress
?
There were some problems with privelege separation on 2.0 kernels - what version of ssh and kernel are you using?
What message do you get when you try to login with a normal user?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.