Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia 
PreviousNextUp[Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server >>
    Getting Started >>
        Location of Installed Files >>
        Starting and Stopping the Server
            Starting the Server
            Stopping the Server
        Operation of the Server >>
        SSH Tectia Server (T) >>
        SSH Tectia Server (A) >>
        SSH Tectia Client >>
        Examples of Use
    Configuration >>
    Authentication >>
    Application Tunneling >>
    Troubleshooting >>
    Man Pages
    Advanced Options >>
    Log Messages >>

Starting and Stopping the Server

The SSH Tectia Server daemon program is called sshd2. It can be configured using a configuration file. Command-line options override values specified in the configuration file.

sshd2 and its certificate validation daemon ssh-certd are normally started at boot time from /etc/rc.local or its equivalent. The sshd2 forks a new daemon for each incoming connection. The child processes handle key exchange, encryption, authentication, command execution, and data exchange.

The server daemon is typically run as root. If it is not run as root, only the user the daemon is running as will be authorized to log in, and password authentication may not work if the system uses shadow passwords. An alternative host key pair in user home directory must also be used.

Starting the Server

Stopping the Server

PreviousNextUp[Contents] [Index]

[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2010 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now