background preloader

3 Steps to Perform SSH Login Without Password Using ssh-keygen & ssh-copy-id

3 Steps to Perform SSH Login Without Password Using ssh-keygen & ssh-copy-id
by Ramesh Natarajan on November 20, 2008 You can login to a remote Linux server without entering password in 3 simple steps using ssky-keygen and ssh-copy-id as explained in this article. ssh-keygen creates the public and private keys. ssh-copy-id copies the local-host’s public key to the remote-host’s authorized_keys file. ssh-copy-id also assigns proper permission to the remote-host’s home, ~/.ssh, and ~/.ssh/authorized_keys. This article also explains 3 minor annoyances of using ssh-copy-id and how to use ssh-copy-id along with ssh-agent. Step 1: Create public and private keys using ssh-key-gen on local-host jsmith@local-host$ [Note: You are on local-host here] jsmith@local-host$ ssh-keygen Generating public/private rsa key pair. Step 2: Copy the public key to remote-host using ssh-copy-id Note: ssh-copy-id appends the keys to the remote-host’s .ssh/authorized_key. Step 3: Login to remote-host without entering the password Using ssh-copy-id along with the ssh-add/ssh-agent

http://www.thegeekstuff.com/2008/11/3-steps-to-perform-ssh-login-without-password-using-ssh-keygen-ssh-copy-id/

Related:  Linux

Managing Multiple SSH Keys » Robot Goblin SSH keys are a very efficient way to make secure connections over the internet, for a large variety of things. Many things use SSH keys regularly, for example using Git on GitHub requires you to register a key to use when accessing repositories. Most of the time, however, their help guides only explain how to create a single key and use it with their service. If you use multiple services that use SSH, you could use the same key for all of them but that would be less secure and would mean having to change your key on each one if you have to change it at any point. Packet Analyzer: 15 TCPDUMP Command Examples tcpdump command is also called as packet analyzer. tcpdump command will work on most flavors of unix operating system. tcpdump allows us to save the packets that are captured, so that we can use it for future analysis. The saved file can be viewed by the same tcpdump command. We can also use open source software like wireshark to read the tcpdump pcap files. In this tcpdump tutorial, let us discuss some practical examples on how to use the tcpdump command. 1.

python-keepassx — keepassx 0.1.0 documentation KeePassX is a cross platform password manager. However, KeePassX is a desktop GUI application. That's where python-keepassx comes in. By using python-keepassx, you can access your passwords using a command line interface to KeePassX. You can also use the python library directly in your own python applications. Python-keepassx: simple, command line interface to your passwords. VMware Images We offer open-source (Linux/Unix) virtual machines (VMDKs) for VMware Player/Plus/Workstation, we install and make them ready-to-use VMware images for you. From here you can download and attach the VMDK image to your VMware and use it. We provide images for both architectures 32bit and 64bit, you can download for free for both architectures. At the moment we have plans to offer you 30+ Linux/Unix distributions, we may add more to our list in near future, you can also send us suggestions if we are missing any popular distribution from our list.

Unix LS Command: 15 Practical Examples ls – Unix users and sysadmins cannot live without this two letter command. Whether you use it 10 times a day or 100 times a day, knowing the power of ls command can make your command line journey enjoyable. In this article, let us review 15 practical examples of the mighty ls command. SSH Can Do That? Productivity Tips for Working with Remote Servers SSH has many features which are helpful when working regularly with files on remote servers; together they can give a vast increase in productivity over the bare use of SSH. If you regularly use SSH, it’s worth spending a little time learning about these and configuring your environment to make your life easier. This has been presented at presented at Yapc Europe 2011 in Riga and the Floss UK Spring 2012 Conference in Edinburgh. If you’d like me to come and talk about this at your user group or workplace, please get in touch. Multiple Connections

Analysis of the Linux backdoor used in freenode IRC network compromise Tuesday October 14, 2014 Background freenode is a large IRC network providing services to Free and Open Source Software communities, and in September the freenode staff team blogged about a potential compromise of an IRC server. Unix Sed Tutorial: Advanced Sed Substitution Examples This article is part of the on-going Unix Sed Tips and Tricks series. In our previous sed articles we learned — sed printing, sed deletion, sed substitute , sed file write, and sed multiple commands. In this article, let us review some interesting workarounds with the “s” substitute command in sed with several practical examples. I. Sed Substitution Delimiter As we discussed in our previous post, we can use the different delimiters such as @ % | ; : in sed substitute command.

iperf3 — iperf3 3.0.11 documentation iperf is a tool for active measurements of the maximum achievable bandwidth on IP networks. It supports tuning of various parameters related to timing, protocols, and buffers. For each test it reports the bandwidth, loss, and other parameters. 15 Examples To Master Linux Command Line History When you are using Linux command line frequently, using the history effectively can be a major productivity boost. In fact, once you have mastered the 15 examples that I’ve provided here, you’ll find using command line more enjoyable and fun. 1. Display timestamp using HISTTIMEFORMAT Typically when you type history from command line, it displays the command# and the command.

The Debian Administrator's Handbook Debian 8 Edition 1 Copyright © 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015 Raphaël Hertzog Unix/Linux Permissions - An Introduction and Tutorial Also see my Unix Page for more tutorials on Unix Updated: Wed Feb 1 23:18:23 EST 2012 Your browser does not have Javascript enabled. I use Javascript for analytics, and to show ads which pay for the maintenance

Linux Directory Structure (File System Structure) Explained with Examples by Ramesh Natarajan on September 8, 2010 Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin directory. Why not /bin, or /sbin, or /usr/sbin? What is the different between all these directories? In this article, let us review the Linux filesystem structures and understand the meaning of individual high-level directories.

Related: