Chapter 5. Using secure communications between two systems with OpenSSH