All Questions

Tagged with
Filter by
Sorted by
Tagged with
0 votes
0 answers
16 views

Custom Linux AMI: How does AWS know where to install account SSH .PEM files when an AMI is provisioned?

We are building a custom AMI from a template EC2 EBS instance snapshot (Oracle Linux 8). This page shows there are many different user names depending on the AMI you choose: https://docs.aws.amazon....
KJ7LNW's user avatar
  • 151
1 vote
1 answer
64 views

Remote Linux server GitHub permission denied publickey issues

I am experiencing publickey permission issues when trying to pull a private repo from GitHub to a remote Linux server. Update Ran ssh -v -o IdentitiesOnly=yes -i ~/.ssh/id_rsa [email protected] command ...
Mike Hermary's user avatar
0 votes
0 answers
588 views

ssh illegal option while trying to connect to remote server

trying to ssh from my macbook pro, to a remote server, ssh ayan@ServerIPAddress gives the following error ssh: illegal option -- ? usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface] ...
Ayan Mitra's user avatar
0 votes
0 answers
140 views

Using PasswordAuthentication yes in sshd config but password is not accepted during login

I tried to enable password authentication in CentOS 7 only for one user - auditor, by having this lines in my sshd.config (at the end of file): PubkeyAuthentication yes ChallengeResponseAuthentication ...
Ruslan Pylypiuk's user avatar
2 votes
1 answer
227 views

Use OpenSSH to make a key exchange with NTRU Prime

I would like to make a key exchange for a symmetric key from the client to the server with the NTRU Prime algorithm (for test reasons). I already installed OpenSSH 9.1 on both sides and checked ...
bilaljo's user avatar
  • 123
3 votes
1 answer
2k views

How to ssh-copy-id through a jump-host? Something similar to the -J option with ssh command

I use a jump host to connect to the remote servers through SSH. I use the following linear command for the connection. ssh -J jumpuser@jumphost:2455 remoteuser@remotehost It works fine. But for new ...
Ajaib Singh's user avatar
3 votes
3 answers
694 views

Administrative access to a server via SSH key

Is it a good idea to set the SSH key directly for the root user for administrative access to a server? Or is it better to use another user for SSH access via SSH key, followed by sudo command? Is the ...
phanaz's user avatar
  • 370
0 votes
1 answer
2k views

SSH permission denied

I have problem logging using ssh to company server. I have my local ~/.ssh/config; Host target HostName xx.yy.zzz.aaa User abcd IdentityFile ~/.ssh/id_ed25519 IdentitiesOnly=yes I have other ...
sjiamnocna's user avatar
1 vote
1 answer
964 views

Permission denied (publickey), but no solution worked

It's one of these issues that get asked and answered so many times here and elsewhere, you can't believe you have to ask it again. I'll let my configuration speaks for me: On remote: # getenforce ...
B. Bergeron's user avatar
1 vote
1 answer
540 views

I used ssh-keyscan in production environment. is it possible to revert back?

I used ssh-keyscan in production environment, after got to know it may allows MITM. I check in known_hosts files, fingerprint is not there. where can i check or is there any option?
Ajith's user avatar
  • 11
0 votes
1 answer
375 views

I used ssh-keyscan to automatically allow fingerprints in production environment. whether it is good

Is there is any options to revert the mentioned action. whether it will cause any security breaches?
Ajith's user avatar
  • 11
0 votes
1 answer
2k views

SSH Key Fingerprint Changes

So I copied an SSH private key from my Linux machine to my M1 Mac. (I've attempted to do this both by uploading the cyphertext to a secrets manager as well as directly transfering the file) but when ...
CRThaze's user avatar
  • 151
0 votes
1 answer
58 views

ssh key pairs: user (public+private) AND host (public+private) OR NOT?

How many types of keys do there exist and where is the private key stored? First of all, keys can be private(=closed=decripting) and public(=open=encrypting). That's ok. That's a key pair. But further,...
Oz_'s user avatar
  • 1
0 votes
3 answers
2k views

SSH asks for password even after i copied the public key to the remote machines

Hopefully, someone can help me resolve this nightmare. I did a project on vagrant provisioning 4 ubuntu machines, 1 controller and 3 servers. Created SSH key on controller and ssh-copy-id command to 3 ...
Kirra Lissa's user avatar
0 votes
3 answers
666 views

How to setup ssh public key for another machine without access?

This might be a stupid question but I have to ask it anyway: I already did setup an ssh public key for my client machine A. I copied the public key to the remote server, everything works fine, I can ...
antimatter's user avatar
0 votes
1 answer
477 views

How to specify identity when using SSH agent?

I've got a slightly unusual use-case... I'm using SSH via certificates, (where the authentication mechanism isn't just a signature from a private key, but also presentation of a signed cert). I have ...
Woodstock's user avatar
  • 103
0 votes
1 answer
305 views

Taking input on remote vm

below is my use case , I have to take a input from a user for a specific command which need to run on a remote machine.But my problem is I am not able to access that machine directly so what I am ...
Mohan's user avatar
  • 1
3 votes
0 answers
3k views

Using SSH key for install npm module from private repository inside docker

I make container for nodejs project. Inside the project I am using private repository. I need an access to it. For that I am using next Dockerfile FROM node:15 RUN echo "StrictHostKeyChecking no&...
Eugene's user avatar
  • 157
1 vote
1 answer
270 views

How can I share the SSH keyes between two users on a CentOs 7 machine?

I am not a sysadmin\network specialist (I am s software developer) and I am finding the following difficulty working on a Linux CentOS 7 remote machine of a customer. I am using MobaxTerm to connect ...
AndreaNobili's user avatar
-1 votes
1 answer
74 views

Best way to lock out a group once per week [duplicate]

A SSH server I admin is to be allowed login from a group of users all days of week except sunday. How would be your elegant solution to this? Thanks any input on comments or creative +and+ secure ...
DrBeco's user avatar
  • 109
0 votes
1 answer
552 views

What is the best method for adding RSA Key Fingerprints to known_hosts upon provisioning each server?

This question was inspired by this thread The hypothetical scenario, for context is as follows: SSH servers, whether they be routers, firewalls etc. are all firstly provisioned within a private + ...
Inquisitive's user avatar
0 votes
2 answers
1k views

SSH Can't connect to Google Cloud Compute-Engine-Instance: Permission denied (publickey)

I followed this tutorial on how to setup a GCE-VM with ssh. However i can't seem to successfully connect via ssh as the guy from the video did! This is the output when i try connecting (IP is ...
Tim Hilt's user avatar
  • 135
2 votes
1 answer
222 views

How can I use different ssh keys for user1@host and user2@host, without resorting to aliased hostnames?

I have a remote CentOS server, lets pretend it's called hostname.com hostname.com has several user accounts, and I want to ssh into this server as any one of these users (using ssh keys rather than ...
carpii's user avatar
  • 541
-1 votes
1 answer
369 views

How to uninstall ssh-keygen utility safely? [duplicate]

I am being tasked to remove ssh-keygen from Ubuntu servers and I don't want to break the computer. Can you please help, how to uninstall ssh-keygen utility safely? Thanks
Bhalu's user avatar
  • 3
0 votes
1 answer
306 views

How can I generate multiple ssh keys for a new Ansible server?

I work on an on-premise network, and we have an Ansible server connected via SSH-Keys to around 400 servers. I've wanted to recreate the Ansible VM, due to the fact that it was poorly made on top of ...
Eyal Menahem's user avatar
0 votes
0 answers
48 views

PasswordLess SSH

We have establish a Passwordless SSH connection between Windows Machine and Linux. For this we have copied public key in .ssh/authorized_key in linux machine. SSH connection was working fine and we ...
AWS_Beginner's user avatar
2 votes
2 answers
654 views

SSH between two servers Linux and AIX

I am trying to do passwordless SSH between two server Linux (source) and AIX (destination) For this i have created public key in Linux server and coped this public key in destination server user ...
AWS_Beginner's user avatar
1 vote
1 answer
198 views

SSH from windows to AIX

I am trying to do SSH from Windows to AIX. I am able to do SSH.But i have some doubt how SSH is working here. pqp1111 is the user in AIX server. In home directory of pqp1111 i can see below key is ...
AWS_Beginner's user avatar
1 vote
0 answers
2k views

Unable to ssh with public / private key pair

I'm unable to connect (ssh) to one of my servers with pubkey. It was working last week, and I have no idea where to search right now. I have a script which should fetch files with scp to use them ...
Guillaume Marmorat's user avatar
0 votes
2 answers
830 views

Mixture of authentication methods for SSH

Is there a way to accomplish Kerberos authentication for some accounts and ssh-key authentication for the others in Linux? The Kerberos method is for accounts that are in Windows and Linux, whereas ...
Anant Raman's user avatar
2 votes
1 answer
23k views

Correct configuration of the SSHD config file?

I'm using ssh on my linux box, I want to secure it to be as watertight as possible, only allowing ssh via ed25519 elliptic curve crypto sigs. I thought I had it setup correctly, disabling password, ...
Woodstock's user avatar
  • 103
0 votes
1 answer
2k views

How to login to a Linux server without SSH key?

I had setup a SSH key to login into my linux server but the SSH public and private key have now been deleted from my personal computer. How can I login into my Linux server with the username and ...
Rasik's user avatar
  • 109
0 votes
1 answer
66 views

Auth with ssh key only

I'm currently working on something on my lab, i want to deploy script to let users auth with ssh key only through ssh and rotate those key every 90 days Those users need to have root rights on the ...
Taumex's user avatar
  • 1
-1 votes
2 answers
2k views

Access Denied to server linux SSH [closed]

I can't access the server using ssh user@IP with the right password i get access denied even though the sshd config is set correctly i restarted it reloaded nothing worked. I generated an rsa key over ...
Zineb BAGHDADI's user avatar
0 votes
1 answer
463 views

SSH refusing pubkey on daemon started by systemd but accepts key when sshd is started manually

When I copy my public key to the server using ssh-copy-id the server actively refuses my connections with a simple type 51 failure. OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 debug1: ...
Gala's user avatar
  • 101
0 votes
1 answer
498 views

How do I create a user and add an SSH key on an EC2 instance?

I can ssh into a remote EC2 instance with ec2-user and the keypair in the EC2 account with root(sudo) privileges. How can I manually create another non-ec2-user user account, add an SSH key, and add ...
fatal_error's user avatar
  • 1,152
1 vote
0 answers
286 views

Ubuntu SSH EC2 Broken Pipe after adding Elastic IP to Instance

Working with AWS EC2, I had a working m5.large instance running Ubuntu 16 with a regular IP address. I added limited access sftp users by editing /etc/sshd/config to the machine, which worked fine. ...
amatusko's user avatar
  • 111
1 vote
2 answers
762 views

How are hackers getting into our server without brute-force? [duplicate]

I am a web developer and we have no one specialising in the wellbeing of the server or the network currently at our office. Usually I can sort many of the issues that arise with my basic knowledge but ...
Emma's user avatar
  • 11
0 votes
1 answer
2k views

Back up using Duplicity through SCP with key-based authentication

I want to back up my system to a remote server through SCP using Duplicity. However, I use key-based authentication. How could I do this?
Merlin04's user avatar
  • 103
0 votes
2 answers
479 views

How to use ssh client without local OS login

I have server-like machines (they are not workstations, fully automated) and I need them to be able to run a script that opens a client ssh connection (to a 3rd party server such as github), and I ...
cowlinator's user avatar
3 votes
2 answers
9k views

Setting up public key authentication to Linux server from Windows (ppk private key)

I created a public and private key using PuTTYgen and copied the public key to .ssh/authorized_keys under my user account. Then I try to specify the private key when trying to log in, but apparently ...
HHH's user avatar
  • 161
7 votes
1 answer
11k views

Cannot edit VM or access it via SSH. error:Supplied fingerprint does not match current metadata fingerprint

I have a Linux machine on Google Cloud, created with Bitnami. It was working well, and it could be accessed through SSH, usign the web console or putty. However suddenly today it can not be accessed ...
Adolfo Martinez's user avatar
1 vote
1 answer
5k views

ssh permission denied from remote host

When I ssh from my box (Arch Linux) to a remote box (Fedora server) using a key, it works with one user (user1) but don't with user2. Both users use the same ssh key: the one in user2 ssh home folder. ...
gabx's user avatar
  • 155
5 votes
1 answer
8k views

How to give temporary access with SSH using certificate authority?

I am trying to work on providing temporary access with SSH using certificate authority on aws EC2 instance, but not able to do it properly. Can you please help give guidance on how can this be ...
mitesh sharma's user avatar
0 votes
1 answer
475 views

Open an ssh tunnel between two servers from a 3rd trusted server

Assume I have 3 servers: A,B and C C can ssh to both A and B but A and B can't connect to eachother. Is it possible to open a tunnel between A and B using C as in "intermediary" without proxying all ...
George's user avatar
  • 115
0 votes
1 answer
4k views

Correct place to store key pairs for SSH authentication with VPS (Cygwin and Linux)

I am using Cygwin on windows 10 to try and ssh into my Linux server for the first time. I have a public and private key pair called whm_rsa and whm_rsa.pub in user/user/.ssh on my local computer. ...
JPB's user avatar
  • 145
-1 votes
3 answers
2k views

Linux + how to run the ssh-keygen interactive from bash script [closed]

Please advice how to generate the file id_rsa.pub without answering the questions from "ssh-keygen -t rsa" my target is to run the ssh-keygen from bash script from postgress USER, and it must run ...
shalom's user avatar
  • 461
0 votes
2 answers
248 views

Is SSH-KEYGEN secure, even when client machine gets hack?

Suppose there is Client - Server machine. On the Client machine, we have generated an SSH-KEYGEN and stored the same key on Server Machine. Which means, when Client connects Server using SSH, it won't ...
Sumit Nayak's user avatar
4 votes
2 answers
2k views

SSH key authentication at server side

I usually do ssh key authentication as follows: generate key on client pc (# ssh-keygen -t rsa) copy the key to server (using ssh-copy-id or by other means) access server from client PC. I have seen ...
Midhun Jose's user avatar
0 votes
2 answers
2k views

Debug SSH not connecting

I am trying to connect to the remote server using ssh, but I have Permission denied (publickey).. I've gone through all possible reasons I can suggest and other questions suggest. I am sure that my ...
confused-demon's user avatar