SSH: Difference between revisions

From Wildsong
Jump to navigationJump to search
Brian Wilson (talk | contribs)
Brian Wilson (talk | contribs)
Line 27: Line 27:
and readable only by that user. The typical commands:
and readable only by that user. The typical commands:


  # cd /home/''username''/.ssh             ''move to user's directory''
  # cd /home/''username''/.ssh                     ''move to user's directory''
  # cat /tmp/id_rsa.pub >> authorized_keys    ''append key to file''
  # cat /tmp/id_rsa.pub >> authorized_keys    ''append key to file''
  # chown ''username'' authorized_keys     ''fix ownership''
  # chown ''username'' authorized_keys             ''fix ownership''
  # chmod 600 authorized_keys                  ''fix permissions
  # chmod 600 authorized_keys                  ''fix permissions

Revision as of 22:37, 15 June 2007

More information on ssh can be found at http://www.openssh.org/

Granting me ssh access so that I can access your system

  1. You have to run an sshd server on your machine.
  2. I generate a key pair in RSA format, creating a passphrase-encrypted private key and a public key.
  3. I send you my public key.
  4. You add my key to the accounts that you want to allow me to have access to. For example, you can create a personal account for me with the username "bwilson" and add the file in /home/bwilson/.ssh/authorized_keys and optionally also put a copy in /root/.ssh/authorized_keys to give me root level access.

Then I can use an ssh client to connect. I enter my passphrase and the client uses the decrypted private key to authenticate with your system. If the private and public keys match, your system grants me access.

As long as I don't share my passphrase with anyone, even if I lose my laptop, no one can use my private key to access your machine.

If you want to revoke access, you remove or disable access to my public key(s).

You don't have to give me any password information on your machine, so you don't have to change the root password when we are done working together.

This is what an RSA public key looks like

ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAsfKX946JbxemrYTT55dTk9Bg98tLeH3PAi5/cpQkWdntATz4ISIvqOltXkKrssj3dlK57M5u86RA05mzIOLPel9o52WCiYUdGiCnAOJa7fS9+XBU2rtrsgl0NBttVbC/m1qH1Ff6WKcGEwjlwxZvQAMk6pdSLDf9A4bns1qpS+jdD4nBOsVjx9cF6MD+1H/JqpNfllXDLeFsNNBivQ8ansAMiOj4WwXyU+XgbaZGngl1LYuwc1Lk+5N8Z4wq+33ERokvKOvNl8dAe4/n0oZqMF7LU+rHqIpUiusDRryFF+O2ogb+yTCwz0TYxNwg0tkTFFZN4xqc5hjhFgWrCuOvPQ== [email protected]

Key file installation notes

The file(s) "authorized_keys" are text files containing public keys. You can add new keys from the command line or using a text editor. The ownership and permissions should be set to be owned by the user account and readable only by that user. The typical commands:

# cd /home/username/.ssh                     move to user's directory
# cat /tmp/id_rsa.pub >> authorized_keys     append key to file
# chown username authorized_keys             fix ownership
# chmod 600 authorized_keys                  fix permissions