Access remote systems using SSH
Access remote systems using SSH
I have vm server called bali1
with no ssh-key
generated, and two other called bali2
and bali3
with their IPs as follows
[root@bali1 home]# cat hosts.txt
192.168.100.246 #bali2
192.168.100.150 #bali3 #port 55022
[root@bali1 home]# ls -lah ~/.ssh/
total 0
drwx------. 2 root root 6 Jan 20 07:20 .
dr-xr-x---. 4 root root 178 Jan 20 21:56 ..
[root@bali1 home]#
Access remote server with passwod on its default port 22
When I connect to bali2
on its defailt port 22
, two files with name know_hosts*
would be created on my own .ssh
directory on bali1
[root@bali1 home]# ssh root@192.168.100.246
The authenticity of host '192.168.100.246 (192.168.100.246)' can't be established.
ED25519 key fingerprint is SHA256:nh2fJ1gLPn9ZtoVpg5jPabgDVi40Gp597iR3w75VGyA.
This key is not known by any other names
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '192.168.100.246' (ED25519) to the list of known hosts.
root@192.168.100.246's password:
Last login: Wed Feb 14 00:53:46 2024
[root@bali2 ~]# hostname
bali2.vps
When I loging out from bali2
I found two generated files in the directory, the known_hosts
file contain information about the hosts that I connected to. Everytime I have connected to another host, this file will append its content with the connected host information comprised IP
addresses and several type of ssh-keys
[root@bali2 ~]# exit
logout
Connection to 192.168.100.246 closed.
[root@bali1 home]# ls -lah ~/.ssh/
total 8.0K
drwx------. 2 root root 48 Feb 14 01:34 .
dr-xr-x---. 4 root root 178 Jan 20 21:56 ..
-rw-------. 1 root root 843 Feb 14 01:34 known_hosts
-rw-r--r--. 1 root root 97 Feb 14 01:34 known_hosts.old
[root@bali1 home]# cat ~/.ssh/known_hosts
192.168.100.246 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE5xpZwBX3LYuRn2EyY0uumnwAmVYZsdtzLbhYrKgzgj
192.168.100.246 ssh-rsa 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
192.168.100.246 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMRuGjkGNw5itkSWGFv7d4haHurWtlClcOG6R4JND2927Ig5s6ovg0Jub69GRZK/D6ntu9EzDbo2OAxWkiusJ5c=
Connect to remote host with ssh-key
instead of password
In order to connect with ssh-key
we need to generate at least one key-gen
with this command ssh-keygen
[root@bali1 home]# ssh -V
OpenSSH_8.7p1, OpenSSL 3.0.7 1 Nov 2022
usage: ssh-keygen [-q] [-a rounds] [-b bits] [-C comment] [-f output_keyfile]
[-m format] [-N new_passphrase] [-O option]
[-t dsa | ecdsa | ecdsa-sk | ed25519 | ed25519-sk | rsa]
[-w provider] [-Z cipher]
ssh-keygen -p [-a rounds] [-f keyfile] [-m format] [-N new_passphrase]
[-P old_passphrase] [-Z cipher]
ssh-keygen -i [-f input_keyfile] [-m key_format]
ssh-keygen -e [-f input_keyfile] [-m key_format]
ssh-keygen -y [-f input_keyfile]
ssh-keygen -c [-a rounds] [-C comment] [-f keyfile] [-P passphrase]
ssh-keygen -l [-v] [-E fingerprint_hash] [-f input_keyfile]
ssh-keygen -B [-f input_keyfile]
ssh-keygen -D pkcs11
ssh-keygen -F hostname [-lv] [-f known_hosts_file]
ssh-keygen -H [-f known_hosts_file]
ssh-keygen -K [-a rounds] [-w provider]
ssh-keygen -R hostname [-f known_hosts_file]
ssh-keygen -r hostname [-g] [-f input_keyfile]
ssh-keygen -M generate [-O option] output_file
ssh-keygen -M screen [-f input_file] [-O option] output_file
ssh-keygen -I certificate_identity -s ca_key [-hU] [-D pkcs11_provider]
[-n principals] [-O option] [-V validity_interval]
[-z serial_number] file ...
ssh-keygen -L [-f input_keyfile]
ssh-keygen -A [-a rounds] [-f prefix_path]
ssh-keygen -k -f krl_file [-u] [-s ca_public] [-z version_number]
file ...
ssh-keygen -Q [-l] -f krl_file [file ...]
ssh-keygen -Y find-principals -s signature_file -f allowed_signers_file
ssh-keygen -Y check-novalidate -n namespace -s signature_file
ssh-keygen -Y sign -f key_file -n namespace file ...
ssh-keygen -Y verify -f allowed_signers_file -I signer_identity
-n namespace -s signature_file [-r revocation_file]
I am going to create ssh-key
ed25519
this time, since it is an easy/shortest ssh-key
available
[root@bali1 home]# ssh-keygen -t ed25519
Generating public/private ed25519 key pair.
Enter file in which to save the key (/root/.ssh/id_ed25519):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_ed25519
Your public key has been saved in /root/.ssh/id_ed25519.pub
The key fingerprint is:
SHA256:UwA9DmqEhjkflAor+Bc5ppYTblye9j/Ic+3i7MUsUBk root@bali1.vps
The key's randomart image is:
+--[ED25519 256]--+
+----[SHA256]-----+
[root@bali1 home]# ls -lah ~/.ssh/
total 16K
drwx------. 2 root root 88 Feb 14 02:15 .
dr-xr-x---. 4 root root 178 Jan 20 21:56 ..
-rw-------. 1 root root 411 Feb 14 02:15 id_ed25519
-rw-r--r--. 1 root root 96 Feb 14 02:15 id_ed25519.pub
-rw-------. 1 root root 978 Feb 14 02:01 known_hosts
-rw-------. 1 root root 843 Feb 14 01:34 known_hosts.old
[root@bali1 home]# cat ~/.ssh/id_ed25519.pub
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE+1eWSa+WCUEpPJ8mOBVN/KtbyIsQWIFSACIF9/3rwk root@bali1.vps
In order to connect to remote host bali2
, we need to pass the content of id_ed25519.pub
to the host’s authorized_keys
file located on the root’s .ssh
directory. The easy way to do so is by using ssh-copy-id
command, as follows:
[root@bali1 home]# ssh-copy-id -i ~/.ssh/id_ed25519.pub -p22 root@192.168.100.246
/usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_ed25519.pub"
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
root@192.168.100.246's password:
Number of key(s) added: 1
Now try logging into the machine, with: "ssh -p '22' 'root@192.168.100.246'"
and check to make sure that only the key(s) you wanted were added
Now we can login to bali2
host without password and found that authorized_keys
file has generated and our ssh-key has set on it
[root@bali1 home]# ssh root@192.168.100.246
Last login: Wed Feb 14 01:34:41 2024 from 192.168.100.169
[root@bali2 ~]# hostname
bali2.vps
[root@bali2 ~]# ls -lah .ssh/
total 4.0K
drwx------. 2 root root 29 Feb 14 02:26 .
dr-xr-x---. 4 root root 178 Jan 20 21:56 ..
-rw-------. 1 root root 96 Feb 14 02:26 authorized_keys
[root@bali2 ~]# cat .ssh/authorized_keys
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE+1eWSa+WCUEpPJ8mOBVN/KtbyIsQWIFSACIF9/3rwk root@bali1.vps
Access remote server on its custom port
Lets do the same thing to bali3
host with port 55022
, we will pass our ssh-key
to the remote host.
[root@bali1 home]# ssh-copy-id -i ~/.ssh/id_ed25519.pub -p55022 root@192.168.100.150
/usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_ed25519.pub"
The authenticity of host '[192.168.100.150]:55022 ([192.168.100.150]:55022)' can't be established.
ED25519 key fingerprint is SHA256:nh2fJ1gLPn9ZtoVpg5jPabgDVi40Gp597iR3w75VGyA.
This host key is known by the following other names/addresses:
~/.ssh/known_hosts:1: [hashed name]
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
/usr/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
/usr/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
root@192.168.100.150's password:
Number of key(s) added: 1
Now try logging into the machine, with: "ssh -p '55022' 'root@192.168.100.150'"
and check to make sure that only the key(s) you wanted were added.
Now when we try logging into the host, no need password anymore and we will find our ssh-key
set up in the authorized_keys
file on the remote machine
[root@bali1 home]# ssh -p55022 root@192.168.100.150
Last login: Wed Feb 14 02:50:20 2024 from 192.168.100.169
[root@bali3 ~]# hostname
bali3.vps
[root@bali3 ~]# cat ~/.ssh/authorized_keys
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE+1eWSa+WCUEpPJ8mOBVN/KtbyIsQWIFSACIF9/3rwk root@bali1.vps
When we go back to host bali1
, we have newer host information registered to our known_hosts
file
[root@bali3 ~]# exit
logout
Connection to 192.168.100.150 closed.
[root@bali1 home]# cat ~/.ssh/known_hosts
|1|DDkcGD9fZDaqY9I2wvNch3oQQoo=|H4dNIbjsoVMtlSmf6PnD9cPEeNY= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE5xpZwBX3LYuRn2EyY0uumnwAmVYZsdtzLbhYrKgzgj
|1|ivEpqQy1ANnu6lPsmYB6XZzYYN8=|7XW/hbz2R2IlU9YaEaAbouGgMxI= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC+YxufueYUsftzbyAwaJPRSjF2sRoemxnONEsCRwBiQdRZXMok45CfvryYGh9igiayWBO4LluoJvGBYYH9TtupFILu76zdPtBdmDxkXst/vBU3JYfRFog1P4rUxn80F0Nzo9Zd49olG0bdGu2jQg/GwQpG+imp5r5rp3QUFxvK5ADlMtp/BqCv1X2W+e79WJDcm3lMCkVxn96mx0dUVSukbWrAgE9zY0dY5nfTh8aI+9fZkBpL3r2YmNLnQiUlTngylqBU/2My7JA/klqBRyQOTRQJ6ScwdtRt6Gzt8sFE70Po5x0LKVLi9p+pOcv3K4C+T1+q+iz1OElQ8NTc+hp6G4Ig2aDIO+2zJKdj4NstExzPi/77v1T1flvNc8pDYz6xndVuoDFr9XboDojW1Ru+PXOj/iKVo655c3iX1JNEoxk/6iBdRKobOcvvMlW194pqzoOPGoDK6ZzwX0iiFH66OyqsoNiLbXq0hhv5YFPpnvVm5CtAHxe51i9Z2oLE5zM=
|1|XjKCyTvDvTsBwytEWC/cMcwutoE=|0/mLRIlkKTM0Qx4KaVoqfXOy29U= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMRuGjkGNw5itkSWGFv7d4haHurWtlClcOG6R4JND2927Ig5s6ovg0Jub69GRZK/D6ntu9EzDbo2OAxWkiusJ5c=
[192.168.100.150]:55022 ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE5xpZwBX3LYuRn2EyY0uumnwAmVYZsdtzLbhYrKgzgj
That’s all for this topic, will continue update this page if there is any other tips worth to share
This material is refers to the rhca objectives