Ssh without password: Difference between revisions
Jump to navigation
Jump to search
Line 3: | Line 3: | ||
== Configuring ssh without password from a POSIX-compliant terminal == | == Configuring ssh without password from a POSIX-compliant terminal == | ||
=== Step 1: create a public key and copy to remote computer === | |||
* Log into a local Linux or MacOSX computer | * Log into a local Linux or MacOSX computer | ||
* Type the following to generate the ssh key: | * Type the following to generate the ssh key: | ||
Line 15: | Line 16: | ||
chmod go-rwx $HOME/.ssh/* | chmod go-rwx $HOME/.ssh/* | ||
</source> | </source> | ||
* Type the following to copy the key to the remote server. | * Type the following to copy the key to the remote server (this will prompt for a password). | ||
<source lang='bash'> | <source lang='bash'> | ||
cd ~/.ssh | cd ~/.ssh | ||
scp id_dsa.pub remote_username@remote_host:/tmp | scp id_dsa.pub remote_username@remote_host:/tmp | ||
</source> | |||
* Type the following to add the ssh key to the remote user's authorization keys (this will prompt for a password). | |||
ssh remote_username@remote_host 'cat /tmp/id_dsa.pub >>/home/ | |||
=== Step 2: configure the public key from the local computer on the remote computer === | |||
* log in to the remote computer using ssh (this will prompt for a password) | |||
<source lang='bash'> | |||
ssh remote_username@remote_host | |||
</source> | |||
* copy the public key generated on the local computer, that was copied to <code>/tmp</code> on the remote computer, is now appended to <code>.ssh/authorized_keys</code>. | |||
<source lang='bash'> | |||
cat /tmp/id_dsa.pub >>$HOME/.ssh/authorized_keys2 | |||
</source> | |||
* similar to your local computer, make sure the permission on your remote home folder, .ssh folder, and authentication files are properly set (NOTE: this may already be the case).<source lang='bash'> | |||
chmod go-w $HOME | |||
chmod 700 $HOME/.ssh | |||
chmod go-rwx $HOME/.ssh/* | |||
</source> | </source> |
Revision as of 20:00, 24 November 2013
Secure shell (ssh) protocols can be configure to work without protocols. This is particularly helpful for machines that are used often.
Configuring ssh without password from a POSIX-compliant terminal
Step 1: create a public key and copy to remote computer
- Log into a local Linux or MacOSX computer
- Type the following to generate the ssh key:
<source lang='bash'> ssh-keygen -t dsa </source>
- Accept the default key location by pressing
Enter
. - Secure permission of your authentication keys by closing permission to your home directory, .ssh directory, and authentication files
<source lang='bash'> chmod go-w $HOME chmod 700 $HOME/.ssh chmod go-rwx $HOME/.ssh/* </source>
- Type the following to copy the key to the remote server (this will prompt for a password).
<source lang='bash'> cd ~/.ssh scp id_dsa.pub remote_username@remote_host:/tmp </source>
- Type the following to add the ssh key to the remote user's authorization keys (this will prompt for a password).
ssh remote_username@remote_host 'cat /tmp/id_dsa.pub >>/home/
Step 2: configure the public key from the local computer on the remote computer
- log in to the remote computer using ssh (this will prompt for a password)
<source lang='bash'> ssh remote_username@remote_host </source>
- copy the public key generated on the local computer, that was copied to
/tmp
on the remote computer, is now appended to.ssh/authorized_keys
.
<source lang='bash'> cat /tmp/id_dsa.pub >>$HOME/.ssh/authorized_keys2 </source>
- similar to your local computer, make sure the permission on your remote home folder, .ssh folder, and authentication files are properly set (NOTE: this may already be the case).<source lang='bash'>
chmod go-w $HOME chmod 700 $HOME/.ssh chmod go-rwx $HOME/.ssh/* </source>