sshkey
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revisionNext revisionBoth sides next revision | ||
sshkey [2007/01/30 14:13] – created damir | sshkey [2011/04/05 16:04] – cangiani | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | You can connect to the servers using the SSH protocol | + | You can connect to the servers using the SSH protocol |
This behaviour can be used when you are using the Servers from the Epfl Network, but also when you connect to the server from outside the Epfl. | This behaviour can be used when you are using the Servers from the Epfl Network, but also when you connect to the server from outside the Epfl. | ||
- | ==== ssh without password from local workstation ==== | + | ===== Ssh without password from local workstation ===== |
+ | ==== Generate the public/ | ||
+ | |||
+ | Note that this doc applies only to Unix (Mac/ | ||
* Login in your workstation and open a Terminal Windows (if you are using the Graphical interface) | * Login in your workstation and open a Terminal Windows (if you are using the Graphical interface) | ||
* Execute this command | * Execute this command | ||
- | $ sshkeygen | + | $ ssh-keygen |
* When the system ask a name for the file **id_dsa** just press enter | * When the system ask a name for the file **id_dsa** just press enter | ||
- | * Do the same for the **id_dsa.pub** file | ||
+ | * The system will ask your for a password. This is the password that is used to encrypt your private key file (id_dsa) so that, even if the file gets stolen, it cannot be used. Try to generate a [[strongpass|strong password]]. | ||
+ | |||
+ | * Now you have to append the content of your public key file '' | ||
+ | |||
+ | $ cat ~/ | ||
+ | |||
+ | * In our cluster, all the machines have access to the same home directory. Therefore you can use standard local copy: | ||
+ | |||
+ | $ cat ~/ | ||
+ | |||
+ | From now, every time you connet to a server, the server will recognize your workstation automatically (it read the ~/ | ||
+ | |||
+ | ==== Setup ssh-agent ==== | ||
+ | |||
+ | In fact, since your private key is encrypted, you need to type the password that can decrypt it each time you want to use it. Seems like we didn't gain anything till now. | ||
+ | |||
+ | Ssh-agent is a program that keeps in memory your decrypted private ssh key and serves it to ssh when it is needed. In this way you only have to type the decryption password only once. Keeping the decrypted key (or the password) in memory is considered safer than letting the key file un-encrypted. | ||
+ | |||
+ | Let's set it up. | ||
+ | |||
+ | |||
+ | |||
+ | ==== Apple Os X & Linux ==== | ||
+ | |||
+ | * Open a terminal emulation window | ||
+ | * Execute the command | ||
+ | |||
+ | $ ssh-keygen -t dsa | ||
+ | |||
+ | * When the system ask a name for the file **id_dsa** just press enter | ||
+ | * Do the same for the **id_dsa.pub** file | ||
* cd in your .ssh directory with | * cd in your .ssh directory with | ||
Line 19: | Line 53: | ||
* Execute this command | * Execute this command | ||
- | $ cat id_dsa.pub | + | $ cat id_dsa.pub |
- | From now, every time you connet | + | * Open another window and from this connect |
+ | * cd in .ssh directory | ||
+ | $ cd ~/.ssh | ||
- | ==== ssh without password from local workstation ==== | + | * Execute the command |
| | ||
+ | $ cat >> authorized_keys | ||
+ | * Now copy & paste with the mouse the key you have in the first window (something that start with sh-dss AAAAB3NzaC1k....) to the second window. | ||
+ | * press the " | ||
+ | * Try to connect to **lth.epfl.ch**, |
sshkey.txt · Last modified: 2022/08/05 13:20 by admin