16.4. Advanced Client UseTo establish an SSH connection, you must fill in the following Connection fields in the Properties window. These include:
16.4.1. Data CompressionF-Secure SSH can transparently compress and uncompress the data traveling over an SSH connection, which can speed up your connection. [Section 7.4.11, "Data Compression"] In the Properties window, choose Connection, and check the box labeled Compression. There's no way to set different compression levels as in SSH1.
16.4.2. Debugging with Verbose ModeIs your SSH session not working as expected? Turn on verbose mode so status messages are printed in the window as your session runs. This can help you locate and solve problems. In the Properties window, select Appearance and check the box labeled Verbose Mode. The next time you connect, you'll see messages like this:
Verbose mode is much like its counterpart in the Unix SSH products. [Section 7.4.15, "Logging and Debugging"] It can be an indispensable tool for diagnosing problems with your connection.debug: connecting ... debug: addresses 18.104.22.168 debug: Registered connecting socket: 12 debug: Connection still in progress debug: Marked name resolver 1 killed debug: Replaced connected socket object 12 with a stream
16.4.3. SOCKS Proxy ServerF-Secure SSH Client supports connecting through SOCKS Version 4 proxy servers. [Section 22.214.171.124, "SOCKS proxy support"] On the Properties window, select Socks and fill in the hostname or IP address of the proxy server machine and the port number on the proxy (the usual SOCKS port is 1080).
16.4.4. Accepting Host KeysEvery SSH server has a unique host key that represents the server's identity, so SSH clients can verify that they are speaking with the actual server and not an impostor. [Section 2.3.1, "Known Hosts"] F-Secure SSH Client keeps track of all host keys it encounters. The keys are stored in the Windows registry. If you want F-Secure SSH Client to reject host keys it hasn't seen before, visit the Properties window and select Security. A checkbox is available to set this option.
16.4.5. Additional Security FeaturesNormally, F-Secure SSH Client keeps track of hostnames, usernames, filenames, and terminal input and output that it encounters. Any time you want to purge this information from the program (say, to prevent a third party from viewing it on your computer), visit the Properties window and select Security. The buttons on this window will delete the information.
16.4.6. Secure File Transfer with SFTPA graphical file transfer program, F-Secure SSH FTP, is also included. Its user interface should be familiar to anyone who has used a graphical FTP client, except that you must set up authentication via SSH. We don't document this program, as it comes with online help, but we did want to mention it.
16.4.7. Command-Line ToolsF-Secure SSH comes with a graphical terminal program as well as command-line clients using the SSH-2 protocol. These include ssh2, scp2, and sftp2. These programs are much the same as their counterparts in SSH2, as described in Chapter 2, "Basic Client Use", except:
C:\> ssh2 server.example.com mycommand
Copyright © 2002 O'Reilly & Associates. All rights reserved.