ssh key

  1. M

    Change SSH KEY on CentOS

    I tried to change the SSH key of my Centos server through the tutorial below: and now I can't connect to my server. Can you check this article's code and give me the problem to solve this problem? Any theory is welcome
  2. B

    Solved Security doubt about ssh-copy-id

    Hi! I have been using SSH for a long time, and I do know the purpose of ssh-copy-id command. If I copy the pubfile contents and paste it into the authorised_keys file on the target server, that's OK, because I already have access to the target server, and there are not security concerns...
  3. jeremyy44

    Jumpbox problem about needing more ssh key's

    Hi, So here is my situation. I have my user desktop, my jumpbox and my server. My thought here is I want to use my jumpbox as well a jumpbox server for ssh, and it works. But I tough I would only need to add the ssh key of the user to the jumpbox and the jumpbox to the server. Not the user...
  4. B

    Cant SSH from Rocky OS -->LinuxMint. It works only vice verca

    Master machine: Rocky 8.5 Targets: LinuxMint and RedHat machines SSL certificarte Created Linux SSL Key from Rocky machine and copied over to targets Has also tested to transfer files from Rocky machine to LinuxMint Machine, no problem But now I cant connect to LinuxMint (123.456.78.911)...
  5. H

    Put the "RSA PRIVATE KEY" in the shh command directly.

    In general, if we want to access the remote server, we need to download the key, "token.pem". Put the key to the specific path, "$HOME/token.pem". Then use [chmod 400 $HOME/token.pem] and [ssh -i $HOME/token.pem user@hostname] for access. Now, I want to write the shell script, ""...
  6. P

    Protect authorized_keys and known_hosts?

    /home/me/.ssh/known_hosts /home/me/.ssh/authorized_keys I would like to put these files to an €ncrypt€d folder that is being decrypted manually after Linux Raspbian 10 start. Why? i do not want anyone to discover that files contents (consider someone steal the drive - my Raspbian installed from...
  7. Rob

    Use an SSH key to log into a remote server

    When you ssh into a remote server, the safest way is to use an ssh key. This video shows you how to create the key, explains the files created by the ssh-keygen command, and shows you how to copy your public key to the remote server. Please subscribe if you liked this video - we're trying to...