This chapter provided a cursory overview of the SSH protocol and how to use it with libssh. We learned a lot about authentication with the SSH protocol, and how the server and client must both authenticate for security. Once the connection was established, we implemented a simple program to execute a command on a remote host. We also saw how libssh makes downloading a file using SCP very easy.
SSH provides a secure communication channel, which effectively denies eavesdroppers the meaning of intercepted communication.
In the next chapter, Chapter 12, Network Monitoring and Security, we continue with the security theme by looking at tools that can effectively eavesdrop on non-secure communication channels.