SSH

From XPUB & Lens-Based wiki
Revision as of 13:06, 3 September 2024 by Manetta (talk | contribs) (→‎SSFS)

Secure Shell

An encrypted protocol for a remote shell login.

See wikipedia:Secure shell

Create a new SSH key

$ ssh-keygen -t ed25519

They key you just created, has a private and a public part:

  • private: id_ed25519
  • public: id_ed25519.pub

IMPORTANT: only share the public part, never the private!!

Install your SSH key on your server

Manual way

  1. copy your public key, this is the public part of one ssh key, it ends with .pub, like: filename.pub
  2. log into your server
  3. edit this file: $ nano ~/.ssh/authorized_keys
  4. paste your public key (the output of $ cat id_ed25519.pub) here on a new line

Handy command that does the same (linux/mac only)

$ ssh-copy-id username@ip-address

Where are my SSH keys stored?

  • linux: /home/USER/.ssh/
  • mac: /Users/USER/.ssh/
  • windows: C:\Users\USER\.ssh\

SSH config file

The ssh configuration file makes it a lot simpler to ssh scp or sshfs.

It is especially convenient when you have keys for different servers. It helps you to keep them organized and to ssh into servers with easy to remember shortcuts.

Rather than typing

scp myfile username@host:/path/to/copy/file/to

We can simply do with

scp myfile hostname:/path/to/copy/file/to

Create the file:

nano ~/.ssh/config

insert:

Host hostname // name for the shortcut you use to ssh into the server
User usename // ssh user
Hostname 192.168.10.20 // hostname of the server
Port 22 // this is the default ssh port
Identityfile ~/.ssh/id_rsa // change and make sure this is the path to the location of your keys
Serveraliveinterval 30

Now you can use the short cut to ssh/scp/sshfs to that and any other host in in .ssh/config

using only

ssh hostname

This is an example of a ~/.ssh/config file:

Host superserver
User username
Hostname super.server.nl

Host superserver2
User anotherusername
Hostname super.serverl.nl
Port 12345
ForwardAgent yes

Now when you want to ssh/scp to your server you can just do the following:

ssh superserver

Store your passphrase (optional)

Keychain is a software that will keep track of which keys are available in your system and will only ask your passphrase once per session instead. It is a front-end to ssh-add and ssh-agent.

Add the following in your shell resource file:

if [ -e ~/.ssh/id_rsa ]
then
    keychain --quiet --nogui ~/.ssh/id_rsa
    . ~/.keychain/${HOSTNAME}-sh
fi

Now restart your session and you will be prompted, once for your passphrase. After that you can directly ssh/scp to the machines where your installed your key and you will not be prompted for any passwords!

SSFS

SSHFS (SSH Filesystem) is a filesystem client for mounting remote directories on your machine, using an SSH connection.

By using it you can access, read, edit files from a remote machine on your local machine, as long as you have an account in the remote machine.

Install

on Debian/Ubuntu

sudo apt update
sudo apt install sshfs

on mac

Use homebrew:

brew cask install osxfuse
brew install sshfs

If homebrew is not installed, run the installation command:

/usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"

Mounting the Remote File System with sshfs

sshfs command essential parameters:

sshfs user@host:remote_directory local_mount_directory  

How to mount:

Create a directory in your local machine, to be use as a mount point

mkdir ~/remote

Mount host remote directory onto the ~/remote directory

ssh user@host:/full/path/to/remote/dir ~/remote

That's it

How to unmount

To unmount the remote dir from the local directory we use the umount NOT unmount, BUT umount

umount ~/remote

See also