Now for allowing a machine to receive a request. You may use another name, but then it must be included on a -i option on the ssh command on the originating machine to explicitly indicate the private key.Ĭheck that your home folder is chmod 700. Your private key must be placed in ~/.ssh/id_rsa or ~/.ssh/id_dsa as appropriate. The following must be done on the client-side machine to originate a connection. See the man page as there are multifarious details if you want to use an agent.ĭon't forget that by default weak (<2048 bit DSA) keys are not accepted by recent versions of sshd. It's the $SHELL part that took me a while to find. The (private) key must be generated without a passphrase, or an agent can be started which will hold a decrypted version of a passphrase-bearing key for clients to use. There must be a ~/.ssh directory chmod 700 on each machine under the account that will originate or receive the connections. Most of these points are mentioned elsewhere this is an aggregation. If one follows it point-by-point, the most common gotchas to passwordless logins should be covered. profile, etc.): SSHAGENT=/usr/bin/ssh-agent If not, you can add the following to your shell RC file (. If you use a desktop environment (Gnome, KDE, etc.) then just logging out and back in will start an SSH agent for you. ssh/authorized_keysįinally, to gain the maximum benefit out of SSH keys, you will want to run an SSH agent. Last login: Sat May 9 10:32:30 2009 from Ĭaligula:~$ cat id_dsa.pub >. ssh/authorized_keys file: claudius:~$ scp. If your distribution doesn't have that, then you should copy the key to the destination host and add it to the (possibly existing). To make sure we haven't added extra keys that you weren't expecting. Now try logging into the machine, with "ssh ''", and check in: Most Linux distributions have a tool ssh-copy-id for doing this: claudius:~$ ssh-copy-id Next, you need to copy the key you just generated to the host that you want to SSH to.
Putty for mac rit password#
Your public key has been saved in /home/dinomite/.ssh/id_rsa.pub.Ī3:93:8c:27:15:67:fa:9f:5d:42:3a:bb:9d:db:93:db hit enter where noted and enter a passphrase when prompted - ideally this is different from your regular login password on both the current host and the ones you will be SSHing to. Your identification has been saved in /home/dinomite/.ssh/id_rsa. On the machine that you will be SSHing from you need to generate your key pair: claudius:~$ ssh-keygenĮnter file in which to save the key (/home/dinomite/.ssh/id_rsa): Įnter passphrase (empty for no passphrase): To summarize what others have said, setting up SSH keys is easy and invaluable.