Ssh without password: Difference between revisions

From HPCwiki
Jump to navigation Jump to search
Line 3: Line 3:
== Configuring ssh without password from a POSIX-compliant terminal ==
== Configuring ssh without password from a POSIX-compliant terminal ==


=== Step 1: create a public key and copy to remote computer ===
* Log into a local Linux or MacOSX computer
* Log into a local Linux or MacOSX computer
* Type the following to generate the ssh key:
* Type the following to generate the ssh key:
Line 15: Line 16:
chmod go-rwx $HOME/.ssh/*
chmod go-rwx $HOME/.ssh/*
</source>
</source>
* Type the following to copy the key to the remote server.
* Type the following to copy the key to the remote server (this will prompt for a password).
<source lang='bash'>
<source lang='bash'>
cd ~/.ssh
cd ~/.ssh
scp id_dsa.pub remote_username@remote_host:/tmp
scp id_dsa.pub remote_username@remote_host:/tmp
</source>
* Type the following to add the ssh key to the remote user's authorization keys (this will prompt for a password).
ssh remote_username@remote_host 'cat /tmp/id_dsa.pub >>/home/
=== Step 2: configure the public key from the local computer on the remote computer ===
* log in to the remote computer using ssh (this will prompt for a password)
<source lang='bash'>
ssh remote_username@remote_host
</source>
* copy the public key generated on the local computer, that was copied to <code>/tmp</code> on the remote computer, is now appended to <code>.ssh/authorized_keys</code>.
<source lang='bash'>
cat /tmp/id_dsa.pub >>$HOME/.ssh/authorized_keys2
</source>
* similar to your local computer, make sure the permission on your remote home folder, .ssh folder, and authentication files are properly set (NOTE: this may already be the case).<source lang='bash'>
chmod go-w $HOME
chmod 700 $HOME/.ssh
chmod go-rwx $HOME/.ssh/*
</source>
</source>

Revision as of 20:00, 24 November 2013

Secure shell (ssh) protocols can be configure to work without protocols. This is particularly helpful for machines that are used often.

Configuring ssh without password from a POSIX-compliant terminal

Step 1: create a public key and copy to remote computer

  • Log into a local Linux or MacOSX computer
  • Type the following to generate the ssh key:

<source lang='bash'> ssh-keygen -t dsa </source>

  • Accept the default key location by pressing Enter.
  • Secure permission of your authentication keys by closing permission to your home directory, .ssh directory, and authentication files

<source lang='bash'> chmod go-w $HOME chmod 700 $HOME/.ssh chmod go-rwx $HOME/.ssh/* </source>

  • Type the following to copy the key to the remote server (this will prompt for a password).

<source lang='bash'> cd ~/.ssh scp id_dsa.pub remote_username@remote_host:/tmp </source>

  • Type the following to add the ssh key to the remote user's authorization keys (this will prompt for a password).

ssh remote_username@remote_host 'cat /tmp/id_dsa.pub >>/home/

Step 2: configure the public key from the local computer on the remote computer

  • log in to the remote computer using ssh (this will prompt for a password)

<source lang='bash'> ssh remote_username@remote_host </source>

  • copy the public key generated on the local computer, that was copied to /tmp on the remote computer, is now appended to .ssh/authorized_keys.

<source lang='bash'> cat /tmp/id_dsa.pub >>$HOME/.ssh/authorized_keys2 </source>

  • similar to your local computer, make sure the permission on your remote home folder, .ssh folder, and authentication files are properly set (NOTE: this may already be the case).<source lang='bash'>

chmod go-w $HOME chmod 700 $HOME/.ssh chmod go-rwx $HOME/.ssh/* </source>