User Tools

Site Tools


general:ssh

This is an old revision of the document!


SSH Access

You can make it easier accessing Linux systems when you use SSH keys, they are alos more secure and the recommended access method.

You need to create first an SSH key and then add the public part in the .ssh/authorized_keys file in your home directory on the remote system.

Creating a new key is simple with ssh-keygen:

  ssh-keygen -t ed25519

This will create a private and public (default would be id_ed25519 and id_ed25519.pub, respectively) keys in your ~/.ssh folder. The *.pub key is the one you need to distribute.

There is a helper script on most Linux system to aid you with that:

  ssh-copy-id -i ~/.ssh/id_ed25519.pub  username@remote_system
  

Choose a difficult and long passphrase, you do not have to type it often as most Linux have an ssh-agent setup. You only need to “unlock” the key once (!) on your local PC. From then on you can have password free logins to all systems where you added your SSH public key.

If you logout and login again, most desktop environments will ask you to provide the passphrase to unlock your key(s). If not, you can unlock the key in the terminal with the command ssh-add.

You can also “forward” keys from one server to the next, i.e. if you use a jump host. Then use the -A parameter with the ssh command.

A nice tutorial from DigitalOcean can be found here, another one is from OpenSUSE.

If you have lots of different systems you can make it easire by providing shortcuts in the .ssh/config file.

Host dix
	Hostname dix.fkp.physik.tu-darmstadt.de
	ForwardAgent yes
        User KnechtRootrecht
        IdentityFile ~/.ssh/my_seperate_key_only_for_dix
        IdentitiesOnly yes
Host dax
	Hostname dax.fkp.physik.tu-darmstadt.de
        User otheruser
general/ssh.1684922531.txt.gz · Last modified: 2023-05-24 10:00 (external edit)