Go to main content

Managing Remote Systems in Oracle® Solaris 11.4

Exit Print View

Updated: November 2020

Accessing a Remote System by Using Secure Shell

The Secure Shell feature of Oracle Solaris provides secure access to a remote system over an unsecured network. In Secure Shell, authentication is provided by the use of passwords and public keys. All network traffic is encrypted. Secure Shell prevents an intruder from intercepting the communication.

Authentication establishes your identity. Authentication for ssh logins is provided by a combination of system passwords and public host keys. Authentication operations can be performed either by the remote system or by the network environment. The /etc/ssh_known_hosts file and the ~/.ssh/known_hosts file contain the list of known host keys on the system or account. By default, the ssh command verifies the remote host's key. If there is no host key for the remote host in either file, the user is asked whether they trust the new remote host's key. If the user confirms, the remote host's key is then added to the user's ~/.ssh/known_hosts file before the user is prompted for their password.

For more information about Secure Shell authentication, refer to About Secure Shell in Managing Secure Shell Access in Oracle Solaris 11.4.

How to Access a Remote System by Using Secure Shell

  1. Log in to a remote system.
    # ssh [-l login-name] hostname | login-name@hostname

    Non-default user name which can be used to log in to the remote system


    Name of the remote system

    If the system's host key is verified, the user is prompted for the password. If the password is typed incorrectly, the user is prompted for the password again.

    If the login to the system is successful, information about the user's last remote login to the system is displayed. The information displayed might include the version of the operating system running on the remote system, latest failed login attempts, and a notification about new email waiting for the user in the user's home directory.

  2. Log out of a remote system.

    Use one of the following commands to log out of the remote system:

    • exit

    • logout

    • Control-D

Example 3  Working on a Remote System by Using ssh

The following example shows the output of a remote login to host1. The system's host key has not been identified in either the /etc/ssh_known_hosts file or the ~/.ssh/known_hosts file. The user has typed an incorrect password at the first attempt.

# ssh -l amy host1
The authenticity of host 'host1 (10:120:100:12)' can't be established.
RSA key fingerprint is 06:55:4d:4e:d2:4a:e6:d9:8a:c4:13:15:18:9a:ef:dd.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'host1' (RSA) to the list of known hosts.
Warning: 1 failed authentication attempt at Wed Jun 27 12:47 2012 since 
last successful authentication.

Last login: Wed Jun 27 12:19:04 2012 from host2.example
Oracle Corporation      SunOS 5.11      11.1    June 2012
# exit