If youre connecting to another computer over the Internet, youll probably want to keep your data safe. SSH is one way to help do that. To make it happen, youll need to set up SSH properly on your computer, and then create an encrypted connection to your server. Just remember, in order for the connection to be secure, both ends of the connection need to have SSH enabled. Follow this guide to make sure that your connection is as safe as possible.
For Windows, you will need to download and install an SSH client program. The most popular one is Cygwin, which is available for free from the developers website. Download and install it like you would any other program. Another popular free program is PuTTY.
During the Cygwin installation, you must choose to install OpenSSH from the Net section.
Linux and Mac OS X come with SSH already installed on the system. This is because SSH is a UNIX system, and Linux and OS X are derived from UNIX.
If you have Windows 10 with the Anniversary Update, you can install the Windows Subsystem for Linux which comes with SSH preinstalled.
Open the terminal program that is installed by Cygwin, or Bash on Ubuntu on Windows for Windows 10, or open the Terminal in OS X or Linux. SSH uses the terminal interface to interact with other computers. There is no graphical interface for SSH, so you will need to get comfortable typing in commands.
Before you dive into creating secure keys and moving files, youll want to test that SSH is properly configured on your computer as well as the system you are connecting to. Enter the following command, replacing username with your username on the remote computer, and remote with the address for the remote computer or server:
$ ssh username@remote
You will be asked for your password once the connection is established. You will not see the cursor move or any characters input when you type your password.
If this step fails, then either SSH is configured incorrectly on your computer or the remote computer is not accepting SSH connections.
When you first connect to the remote computer, you should be located in your HOME directory. To move around the directory structure, use the
will move you into the specified subdirectory.
will move you into the specified directory from the root (home).
will return you to your HOME directory.
Check your current directorys contents.
To see what files and folders in your current location, you can use the
will list all of the files and folders in your current directory.
will list the contents of the directory along with additional information such as size, permissions, and date.
will list all the contents including hidden files and folders.
Copy files from your location to the remote computer.
If you need to copy files from your local computer to the computer you are accessing remotely, you can use the
scp /localdirectory/example1.txt username@remote:path
will copy example1.txt to the specified path on the remote computer. You can leave path blank to copy to the root folder of the remote computer.
scp username@remote:/home/example1.txt ./
will move example1.txt from the home directory on the remote computer to the current directory on the local computer.
command to make copies of files either in the same directory or into a directory of your choosing:
will create a copy of example1.txt called example2.txt in the same location.
will create a copy of example1.txt in the location specified by directory.
If you want to change a files name or move it without copying, you can use the
will rename example1.txt to example2.txt. The file will stay in the same location.
will rename directory1 to directory2. The directorys contents will remain unchanged.
will move example1.txt into directory1.
mv example1.txt directory1/example2.txt
will move example1.txt into directory1 and rename it to example2.txt
If you need to remove anything from the computer you are connected to, you can use the
will delete the file example1.txt after prompting you to confirm.
will delete directory1 and all of its contents.
You can change the read and write privileges of your files using the
will add the write (modify) permission to the file for the user (u). You can also use the
modifier for group permissions or the
will add the read (access) permission to the file for the group.
There are a large list of permissions that you can use to secure or open various aspects of your system.
Learn the other assorted basic commands.
There are a few more important commands that you will be using quite a bit in the shell interface. They include:
will create a new subdirectory called newdirectory.
will display your current directory location.
shows who is logged into the system.
will create a new file and open the file editor. Different system will have different file editors installed. The most common are pico and vi. You may need to use different commands if you have a different file editor installed.
Get detailed information on any command.
If you are unsure as to what a command will do, you can use the
command to learn about all of the possible uses and parameters:
will display information about that command.
will search all of the man pages for the keyword you specify.
These keys will allow you to connect to the remote location without having to enter your password each time. This is a much more secure way to connect to the remote computer, as the password will not have to transmitted over the network.
Create the key folder on your computer by entering the command
Create the public and private keys by using the command
You will be asked if you would like to create a passphrase for the keys; this is optional. If you dont want to create a passphrase, press Enter. This will create two keys in the .ssh directory: id_rsa and id_rsa.pub
Change your private keys permissions. In order to ensure that the private key is only readable by you, enter the command
Place the public key on the remote computer.
Once your keys are created, youre ready to place the public key on the remote computer so that you can connect without a password. Enter the following command, replacing the appropriate parts as explained earlier:
$ scp .ssh/id_rsa.pub username@remote:
Make sure to include the colon (:) at the end of the command.
You will be asked to input your password before the file transfer starts.
Install the public key on the remote computer.
Once youve placed the key on the remote computer, you will need to install it so that it works correctly. First, log in to the remote computer the same way that you did in Step 3.
Create an SSH folder on the remote computer, if it does not already exist:
Append your key to the authorized keys file. If the file does not exist yet, it will be created:
$ cat id_rsa.pub .ssh/authorized_keys
Change the permissions for the SSH folder to allow access:
Once the key has been installed on the remote computer, you should be able to initiate a connection without being asked to enter your password. Enter the following command to test the connection:
$ ssh username@remote
If you connect without being prompted for the password, then the keys are configured correctly.
Categories:Featured ArticlesInternet Security
Español:usar SSH Deutsch:SSH verwenden Portugus:Utilizar SSH Italiano:Usare il Protocollo Secure SHell (SSH) : SSH :SSH Français:utiliser un serveur SSH Bahasa Indonesia:Menggunakan SSH Nederlands:SSH gebruiken العربية:استخدام SSH हिन्दी:SSH का उपयोग करें Čeština:Jak použvat SSH 한국어:SSH 사용법 ไทย:ใช้ SSH
Thanks to all authors for creating a page that has been read 702,861 times.