- On host_src,
run this command as the user that runs scp/ssh/rsync
$ ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
Chú ý:Nếu không muốn hiện bản nhập key thì
Enter passphrase bằng rỗng
This will prompt for a passphrase. Just press the enter key. It'll then generate an identification (private key) and a public key. Do not ever share the private key with anyone! ssh-keygen shows where it saved the public key. This is by default ~/.ssh/id_rsa.pub:
Your public key has been saved in
- Transfer the
or any other method.
- On host_dest, login as the remote user which you plan to use when you run scp, ssh or rsync on host_src.
- Copy the contents
- $ cat
id_rsa.pub >> ~/.ssh/authorized_keys
$ chmod 700 ~/.ssh/authorized_keys
- Note that ssh
by default does not allow root to log in. This has to be explicitly
enabled on host_dest.
This can be done by editing /etc/ssh/sshd_config
and changing the option of PermitRootLogin
Don't forget to restart sshd so that it reads the modified config file. Do this only
if you want to use the root login.
Cần copy nội dung id_rsa.pub ghi vào file ~/.ssh/authorized_keysNếu có nhiều key thì copy vào bên dưới file ~/.ssh/authorized_keys
If this file does not exists, then the above command will create it. Make sure you remove permission for others to read this file. If its a public key, why prevent others from reading this file? Probably, the owner of the key has distributed it to a few trusted users and has not placed any additional security measures to check if its really a trusted user.