All Questions
129
questions
0
votes
0
answers
16
views
Custom Linux AMI: How does AWS know where to install account SSH .PEM files when an AMI is provisioned?
We are building a custom AMI from a template EC2 EBS instance snapshot (Oracle Linux 8). This page shows there are many different user names depending on the AMI you choose:
https://docs.aws.amazon....
1
vote
1
answer
64
views
Remote Linux server GitHub permission denied publickey issues
I am experiencing publickey permission issues when trying to pull a private repo from GitHub to a remote Linux server.
Update
Ran ssh -v -o IdentitiesOnly=yes -i ~/.ssh/id_rsa [email protected] command ...
0
votes
0
answers
588
views
ssh illegal option while trying to connect to remote server
trying to ssh from my macbook pro, to a remote server,
ssh ayan@ServerIPAddress
gives the following error
ssh: illegal option -- ?
usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface]
...
0
votes
0
answers
140
views
Using PasswordAuthentication yes in sshd config but password is not accepted during login
I tried to enable password authentication in CentOS 7 only for one user - auditor, by having this lines in my sshd.config (at the end of file):
PubkeyAuthentication yes
ChallengeResponseAuthentication ...
2
votes
1
answer
227
views
Use OpenSSH to make a key exchange with NTRU Prime
I would like to make a key exchange for a symmetric key from the client to the server with the NTRU Prime algorithm (for test reasons). I already installed OpenSSH 9.1 on both sides and checked ...
3
votes
1
answer
2k
views
How to ssh-copy-id through a jump-host? Something similar to the -J option with ssh command
I use a jump host to connect to the remote servers through SSH.
I use the following linear command for the connection.
ssh -J jumpuser@jumphost:2455 remoteuser@remotehost
It works fine.
But for new ...
3
votes
3
answers
694
views
Administrative access to a server via SSH key
Is it a good idea to set the SSH key directly for the root user for administrative access to a server?
Or is it better to use another user for SSH access via SSH key, followed by sudo command?
Is the ...
0
votes
1
answer
2k
views
SSH permission denied
I have problem logging using ssh to company server.
I have my local ~/.ssh/config;
Host target
HostName xx.yy.zzz.aaa
User abcd
IdentityFile ~/.ssh/id_ed25519
IdentitiesOnly=yes
I have other ...
1
vote
1
answer
964
views
Permission denied (publickey), but no solution worked
It's one of these issues that get asked and answered so many times here and elsewhere, you can't believe you have to ask it again.
I'll let my configuration speaks for me:
On remote:
# getenforce
...
1
vote
1
answer
540
views
I used ssh-keyscan in production environment. is it possible to revert back?
I used ssh-keyscan in production environment, after got to know it may allows MITM. I check in known_hosts files, fingerprint is not there. where can i check or is there any option?
0
votes
1
answer
375
views
I used ssh-keyscan to automatically allow fingerprints in production environment. whether it is good
Is there is any options to revert the mentioned action. whether it will cause any security breaches?
0
votes
1
answer
2k
views
SSH Key Fingerprint Changes
So I copied an SSH private key from my Linux machine to my M1 Mac. (I've attempted to do this both by uploading the cyphertext to a secrets manager as well as directly transfering the file) but when ...
0
votes
1
answer
58
views
ssh key pairs: user (public+private) AND host (public+private) OR NOT?
How many types of keys do there exist and where is the private key stored?
First of all, keys can be private(=closed=decripting) and public(=open=encrypting). That's ok. That's a key pair.
But further,...
0
votes
3
answers
2k
views
SSH asks for password even after i copied the public key to the remote machines
Hopefully, someone can help me resolve this nightmare.
I did a project on vagrant provisioning 4 ubuntu machines, 1 controller and 3 servers.
Created SSH key on controller and ssh-copy-id command to 3 ...
0
votes
3
answers
666
views
How to setup ssh public key for another machine without access?
This might be a stupid question but I have to ask it anyway:
I already did setup an ssh public key for my client machine A. I copied the public key to the remote server, everything works fine, I can ...
0
votes
1
answer
477
views
How to specify identity when using SSH agent?
I've got a slightly unusual use-case...
I'm using SSH via certificates, (where the authentication mechanism isn't just a signature from a private key, but also presentation of a signed cert).
I have ...
0
votes
1
answer
305
views
Taking input on remote vm
below is my use case , I have to take a input from a user for a specific command which need to run on a remote machine.But my problem is I am not able to access that machine directly so what I am ...
3
votes
0
answers
3k
views
Using SSH key for install npm module from private repository inside docker
I make container for nodejs project. Inside the project I am using private repository. I need an access to it. For that I am using next Dockerfile
FROM node:15
RUN echo "StrictHostKeyChecking no&...
1
vote
1
answer
270
views
How can I share the SSH keyes between two users on a CentOs 7 machine?
I am not a sysadmin\network specialist (I am s software developer) and I am finding the following difficulty working on a Linux CentOS 7 remote machine of a customer.
I am using MobaxTerm to connect ...
-1
votes
1
answer
74
views
Best way to lock out a group once per week [duplicate]
A SSH server I admin is to be allowed login from a group of users all days of week except sunday.
How would be your elegant solution to this? Thanks any input on comments or creative +and+ secure ...
0
votes
1
answer
552
views
What is the best method for adding RSA Key Fingerprints to known_hosts upon provisioning each server?
This question was inspired by this thread
The hypothetical scenario, for context is as follows:
SSH servers, whether they be routers, firewalls etc. are all firstly provisioned within a private + ...
0
votes
2
answers
1k
views
SSH Can't connect to Google Cloud Compute-Engine-Instance: Permission denied (publickey)
I followed this tutorial on how to setup a GCE-VM with ssh. However i can't seem to successfully connect via ssh as the guy from the video did! This is the output when i try connecting (IP is ...
2
votes
1
answer
222
views
How can I use different ssh keys for user1@host and user2@host, without resorting to aliased hostnames?
I have a remote CentOS server, lets pretend it's called hostname.com
hostname.com has several user accounts, and I want to ssh into this server as any one of these users (using ssh keys rather than ...
-1
votes
1
answer
369
views
How to uninstall ssh-keygen utility safely? [duplicate]
I am being tasked to remove ssh-keygen from Ubuntu servers and I don't want to break the computer. Can you please help, how to uninstall ssh-keygen utility safely?
Thanks
0
votes
1
answer
306
views
How can I generate multiple ssh keys for a new Ansible server?
I work on an on-premise network, and we have an Ansible server connected via SSH-Keys to around 400 servers.
I've wanted to recreate the Ansible VM, due to the fact that it was poorly made on top of ...
0
votes
0
answers
48
views
PasswordLess SSH
We have establish a Passwordless SSH connection between Windows Machine and Linux.
For this we have copied public key in .ssh/authorized_key in linux machine.
SSH connection was working fine and we ...
2
votes
2
answers
654
views
SSH between two servers Linux and AIX
I am trying to do passwordless SSH between two server Linux (source) and AIX (destination)
For this i have created public key in Linux server and coped this public key in destination server user ...
1
vote
1
answer
198
views
SSH from windows to AIX
I am trying to do SSH from Windows to AIX.
I am able to do SSH.But i have some doubt how SSH is working here.
pqp1111 is the user in AIX server.
In home directory of pqp1111 i can see below key is ...
1
vote
0
answers
2k
views
Unable to ssh with public / private key pair
I'm unable to connect (ssh) to one of my servers with pubkey. It was working last week, and I have no idea where to search right now.
I have a script which should fetch files with scp to use them ...
0
votes
2
answers
830
views
Mixture of authentication methods for SSH
Is there a way to accomplish Kerberos authentication for some accounts and ssh-key authentication for the others in Linux? The Kerberos method is for accounts that are in Windows and Linux, whereas ...
2
votes
1
answer
23k
views
Correct configuration of the SSHD config file?
I'm using ssh on my linux box, I want to secure it to be as watertight as possible, only allowing ssh via ed25519 elliptic curve crypto sigs.
I thought I had it setup correctly, disabling password, ...
0
votes
1
answer
2k
views
How to login to a Linux server without SSH key?
I had setup a SSH key to login into my linux server but the SSH public and private key have now been deleted from my personal computer. How can I login into my Linux server with the username and ...
0
votes
1
answer
66
views
Auth with ssh key only
I'm currently working on something on my lab, i want to deploy script to let users auth with ssh key only through ssh and rotate those key every 90 days
Those users need to have root rights on the ...
-1
votes
2
answers
2k
views
Access Denied to server linux SSH [closed]
I can't access the server using ssh user@IP with the right password i get access denied even though the sshd config is set correctly i restarted it reloaded nothing worked.
I generated an rsa key over ...
0
votes
1
answer
463
views
SSH refusing pubkey on daemon started by systemd but accepts key when sshd is started manually
When I copy my public key to the server using ssh-copy-id the server actively refuses my connections with a simple type 51 failure.
OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017
debug1: ...
0
votes
1
answer
498
views
How do I create a user and add an SSH key on an EC2 instance?
I can ssh into a remote EC2 instance with ec2-user and the keypair in the EC2 account with root(sudo) privileges.
How can I manually create another non-ec2-user user account, add an SSH key, and add ...
1
vote
0
answers
286
views
Ubuntu SSH EC2 Broken Pipe after adding Elastic IP to Instance
Working with AWS EC2, I had a working m5.large instance running Ubuntu 16 with a regular IP address. I added limited access sftp users by editing /etc/sshd/config to the machine, which worked fine. ...
1
vote
2
answers
762
views
How are hackers getting into our server without brute-force? [duplicate]
I am a web developer and we have no one specialising in the wellbeing of the server or the network currently at our office. Usually I can sort many of the issues that arise with my basic knowledge but ...
0
votes
1
answer
2k
views
Back up using Duplicity through SCP with key-based authentication
I want to back up my system to a remote server through SCP using Duplicity. However, I use key-based authentication. How could I do this?
0
votes
2
answers
479
views
How to use ssh client without local OS login
I have server-like machines (they are not workstations, fully automated) and I need them to be able to run a script that opens a client ssh connection (to a 3rd party server such as github), and I ...
3
votes
2
answers
9k
views
Setting up public key authentication to Linux server from Windows (ppk private key)
I created a public and private key using PuTTYgen and copied the public key to .ssh/authorized_keys under my user account.
Then I try to specify the private key when trying to log in, but apparently ...
7
votes
1
answer
11k
views
Cannot edit VM or access it via SSH. error:Supplied fingerprint does not match current metadata fingerprint
I have a Linux machine on Google Cloud, created with Bitnami.
It was working well, and it could be accessed through SSH, usign the web console or putty. However suddenly today it can not be accessed ...
1
vote
1
answer
5k
views
ssh permission denied from remote host
When I ssh from my box (Arch Linux) to a remote box (Fedora server) using a key, it works with one user (user1) but don't with user2. Both users use the same ssh key: the one in user2 ssh home folder. ...
5
votes
1
answer
8k
views
How to give temporary access with SSH using certificate authority?
I am trying to work on providing temporary access with SSH using certificate authority on aws EC2 instance, but not able to do it properly. Can you please help give guidance on how can this be ...
0
votes
1
answer
475
views
Open an ssh tunnel between two servers from a 3rd trusted server
Assume I have 3 servers: A,B and C
C can ssh to both A and B but A and B can't connect to eachother.
Is it possible to open a tunnel between A and B using C as in "intermediary" without proxying all ...
0
votes
1
answer
4k
views
Correct place to store key pairs for SSH authentication with VPS (Cygwin and Linux)
I am using Cygwin on windows 10 to try and ssh into my Linux server for the first time. I have a public and private key pair called whm_rsa and whm_rsa.pub in user/user/.ssh on my local computer.
...
-1
votes
3
answers
2k
views
Linux + how to run the ssh-keygen interactive from bash script [closed]
Please advice how to generate the file id_rsa.pub without answering the questions from "ssh-keygen -t rsa"
my target is to run the ssh-keygen from bash script from postgress USER, and it must run ...
0
votes
2
answers
248
views
Is SSH-KEYGEN secure, even when client machine gets hack?
Suppose there is Client - Server machine.
On the Client machine, we have generated an SSH-KEYGEN and stored the same key on Server Machine.
Which means, when Client connects Server using SSH, it won't ...
4
votes
2
answers
2k
views
SSH key authentication at server side
I usually do ssh key authentication as follows:
generate key on client pc (# ssh-keygen -t rsa)
copy the key to server (using ssh-copy-id or by other means)
access server from client PC.
I have seen ...
0
votes
2
answers
2k
views
Debug SSH not connecting
I am trying to connect to the remote server using ssh, but I have Permission denied (publickey)..
I've gone through all possible reasons I can suggest and other questions suggest.
I am sure that my ...