Friday, June 12, 2015

How to Use SSH

If you're connecting to another computer over the notoriously insecure Internet, you'll probably want to do everything you can to keep your data safe. SSH is one way to help do that. To make it happen, you'll need to set up SSH properly on your computer, and then create an encrypted connection to your server. Just remember, in order for the connection to be secure, both ends of the connection need to have SSH enabled. Follow this guide to make sure that your connection is as safe as possible.

Steps

Connecting for the First Time

  1. Install SSH. For Windows, you will need to download and install an SSH client program. The most popular one is Cygwin, which is available for free from the developer’s website. Download and install it like you would any other program. Another popular free program is PuTTY.[1]
    Use SSH Step 1 Version 5.jpg
    • During the Cygwin installation, you must choose to install OpenSSH from the Net section.
    • Linux and Mac OS X come with SSH already installed on the system. This is because SSH is a UNIX system, and Linux and OS X are derived from UNIX.
  2. Run SSH. Open the terminal program that is installed by Cygwin, or open the Terminal in OS X or Linux. SSH uses the terminal interface to interact with other computers. There is no graphical interface for SSH, so you will need to get comfortable typing in commands.
    Use SSH Step 2 Version 5.jpg
  3. Test the connection. Before you dive into creating secure keys and moving files, you’ll want to test that SSH is properly configured on your computer as well as the system you are connecting to. Enter the following command, replacing <username> with your username on the remote computer, and <remote> with the address for the remote computer or server:
    Use SSH Step 3 Version 3.jpg
    • $ ssh <username>@<remote>
    • You will be asked for your password once the connection is established. You will not see the cursor move or any characters inputted when you type your password.
    • If this step fails, then either SSH is configured incorrectly on your computer or the remote computer is not accepting SSH connections.

Learning Basic Commands

  1. Navigate the SSH shell. When you first connect to the remote computer, you should be located in your HOME directory. To move around the directory structure, use the cd command:[2]
    Use SSH Step 4 Version 3.jpg
    • cd .. will move you up one directory.
    • cd <directoryname> will move you into the specified subdirectory.
    • cd /home/directory/path/ will move you into the specified directory from the root (home).
    • cd ~ will return you to your HOME directory.
  2. Check your current directory's contents. To see what files and folders in your current location, you can use the ls command:[3]
    Use SSH Step 5 Version 2.jpg
    • ls will list all of the files and folders in your current directory.
    • ls –l will list the contents of the directory along with additional information such as size, permissions, and date.
    • ls-a will list all the contents including hidden files and folders.
  3. Copy files from your location to the remote computer. If you need to copy files from your local computer to the computer you are accessing remotely, you can use the scp command:
    Use SSH Step 6 Version 2.jpg
    • scp /localdirectory/example1.txt <username>@<remote>:<path> will copy example1.txt to the specified <path> on the remote computer. You can leave <path> blank to copy to the root folder of the remote computer.
    • scp <username>@<remote>:/home/example1.txt ./ will move example1.txt from the home directory on the remote computer to the current directory on the local computer.
  4. Copy files through the shell. You can use the cp command to make copies of files either in the same directory or into a directory of your choosing:
    Use SSH Step 7 Version 2.jpg
    • cp example1.txt example2.txt will create a copy of example1.txt called example2.txt in the same location.
    • cp example1.txt <directory>/ will create a copy of example1.txt in the location specified by <directory>.
  5. Move and rename files. If you want to change a file’s name or move it without copying, you can use the mv command:
    Use SSH Step 8 Version 2.jpg
    • mv example1.txt example2.txt will rename example1.txt to example2.txt. The file will stay in the same location.
    • mv directory1 directory2 will rename directory1 to directory2. The directory’s contents will remain unchanged.
    • mv example1.txt directory1/ will move example1.txt into directory1.
    • mv example1.txt directory1/example2.txt will move example1.txt into directory1 and rename it to example2.txt
  6. Delete files and directories. If you need to remove anything from the computer you are connected to, you can use the rm command:
    Use SSH Step 9 Version 2.jpg
    • rm example1.txt will delete the file example1.txt.
    • rm –I example1.txt will delete the file example1.txt after prompting you to confirm.
    • rm directory1/ will delete directory1 and all of its contents.
  7. Change permissions for your files. You can change the read and write privileges of your files using the chmod command:
    Use SSH Step 10 Version 2.jpg
    • chmod u+w example1.txt will add the write (modify) permission to the file for the user (u). You can also use the g modifier for group permissions or the o for world permissions.
    • chmod g+r example1.txt will add the read (access) permission to the file for the group.
    • There are a large list of permissions that you can use to secure or open various aspects of your system.[4]
  8. Learn the other assorted basic commands. There are a few more important commands that you will be using quite a bit in the shell interface. They include:
    Use SSH Step 11 Version 2.jpg
    • mkdir newdirectory will create a new subdirectory called newdirectory.
    • pwd will display your current directory location.
    • who shows who is logged into the system.
    • pico newfile.txt or vi newfile.txt will create a new file and open the file editor. Different system will have different file editors installed. The most common are pico and vi. You may need to use different commands if you have a different file editor installed.
  9. Get detailed information on any command. If you are unsure as to what a command will do, you can use the man command to learn about all of the possible uses and parameters:
    Use SSH Step 12 Version 2.jpg
    • man <command> will display information about that command.
    • man –k <keyword> will search all of the man pages for the keyword you specify.[5]

Creating Encrypted Keys

  1. Create your SSH keys. These keys will allow you to connect to the remote location without having to enter your password each time. This is a much more secure way to connect to the remote computer, as the password will not have to transmitted over the network.
    Use SSH Step 13 Version 2.jpg
    • Create the key folder on your computer by entering the command $ mkdir .ssh
    • Create the public and private keys by using the command $ ssh-keygen –t rsa
    • You will be asked if you would like to create a passphrase for the keys; this is optional. If you don’t want to create a passphrase, press Enter. This will create two keys in the .ssh directory: id_rsa and id_rsa.pub
    • Change your private key’s permissions. In order to ensure that the private key is only readable by you, enter the command $ chmod 600 .ssh/id_rsa
  2. Place the public key on the remote computer. Once your keys are created, you’re ready to place the public key on the remote computer so that you can connect without a password. Enter the following command, replacing the appropriate parts as explained earlier:
    Use SSH Step 14 Version 2.jpg
    • $ scp .ssh/id_rsa.pub <username>@<remote>:
    • Make sure to include the colon (:) at the end of the command.
    • You will be asked to input your password before the file transfer starts.
  3. Install the public key on the remote computer. Once you’ve placed the key on the remote computer, you will need to install it so that it works correctly. First, log in to the remote computer the same way that you did in Step 3.
    Use SSH Step 15 Version 2.jpg
    • Create an SSH folder on the remote computer, if it does not already exist: $ mkdir .ssh
    • Append your key to the authorized keys file. If the file does not exist yet, it will be created: $ cat id_rsa.pub >> .ssh/authorized_keys
    • Change the permissions for the SSH folder to allow access: $ chmod 700 .ssh
  4. Check that the connection works. Once the key has been installed on the remote computer, you should be able to initiate a connection without being asked to enter your password. Enter the following command to test the connection: $ ssh <username>@<remote>
    Use SSH Step 16 Version 3.jpg
    • If you connect without being prompted for the password, then the keys are configured correctly.[6]


Video

Related wikiHows

Sources and Citations


Cite error: <ref> tags exist, but no <references/> tag was found




from How to of the Day http://ift.tt/1eWjNtR

No comments:

Post a Comment