First we will see, how to install the openssh in your ubuntu machine.
1) Type the below command in your console
2) Once it get installed, see whether you have the sshd dameon is running in your system or not.
3) Now you are ready to use the ssh connection. Lets test the ssh connection to the localhost itself.
Now provide the password for your user account. And it will get into the system (in this case its localhost)
4) How to set password less connectivity ?
5) create public key and private key for the host by using the below command.
6) Now you can see a .ssh folder is created in your home directory and you can see some files inside the .ssh folder.
Note : .ssh is hidden folder
7) create a new file called authorized_keys2 in .ssh folder and copy the contents of id_rsa.pub.
That’s all. Now try the ssh command.
This time ssh command didn’t ask the password.
If you want to connect to some other machine, then scp the id_rsa.pub file to the destination machine and put it under the .ssh folder in the name of authorized_keys2.
or
$ sudo apt-get install openssh-server openssh-client |
1 | $ps -ef | grep ssh |
3) Now you are ready to use the ssh connection. Lets test the ssh connection to the localhost itself.
1 | $ ssh localhost |
Now provide the password for your user account. And it will get into the system (in this case its localhost)
4) How to set password less connectivity ?
5) create public key and private key for the host by using the below command.
1 | #Goto the home directory and execute the below ssh-keygen command |
6) Now you can see a .ssh folder is created in your home directory and you can see some files inside the .ssh folder.
Note : .ssh is hidden folder
1 | kamaraj@Kamaraj:~/.ssh$ ls -lrt |
1 | ~/.ssh/id_rsa : private or identification key |
7) create a new file called authorized_keys2 in .ssh folder and copy the contents of id_rsa.pub.
1 | cat id_rsa.pub >> authorized_keys2 |
2 | $ ssh localhost |
This time ssh command didn’t ask the password.
If you want to connect to some other machine, then scp the id_rsa.pub file to the destination machine and put it under the .ssh folder in the name of authorized_keys2.
or
Execute these two commands:
ssh-keygen
After the key is copied, ssh into the machine as normal
ssh user@host
You can now login without entering a password from the particular machine you executed the commands at.
Example
not-marco@rinzwind-desktop:~$ ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/home/not-marco/.ssh/id_rsa):
Created directory '/home/not-marco/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/not-marco/.ssh/id_rsa.
Your public key has been saved in /home/not-marco/.ssh/id_rsa.pub.
The key fingerprint is:
b1:25:04:21:1a:38:73:38:3c:e9:e4:5b:81:e9:ac:0f not-marco@rinzwind-desktop
The key's randomart image is:
+--[ RSA 2048]----+
|.o= . oo. |
|*B.+ . . |
|*=o . o . |
| = . = |
|. o S |
|E. |
| o |
| . |
| |
+-----------------+
not-marco@rinzwind-desktop:~$ ssh-copy-id not-marco@127.0.0.1
not-marco@127.0.0.1's password:
Now try logging into the machine, with "ssh 'not-marco@127.0.0.1'", and check in:
~/.ssh/authorized_keys
to make sure we haven't added extra keys that you weren't expecting.
Explanation
This assumes you already have successfully connected to your server via SSH.
You'll need to generate an SSH Keypair which will allow you to identify you as yourself without using a password. You can opt to protect keys with a passcode if you wish, but this can be left blank allowing totally password-less SSH access.
First create your SSH Keypair by running
ssh-keygen
this will create an id_rsa
and id_rsa.pub
file. The pub
file is what goes on the servers, the private key (id_rsa
) is what stays with you and is how you identify yourself.Next copy the public key to your server with
ssh-copy-id user@server
replacing user with your remote user and server with the machine DNS name or IP address. It'll prompt for your SSH password, enter it and if all completes successfully you'll be able to access the machine via ssh user@server
without needing a password.
No comments:
Post a Comment