<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Ssh</id>
		<title>Ssh - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://beardedmaker.com/wiki/index.php?action=history&amp;feed=atom&amp;title=Ssh"/>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Ssh&amp;action=history"/>
		<updated>2026-04-18T12:13:16Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://beardedmaker.com/wiki/index.php?title=Ssh&amp;diff=161&amp;oldid=prev</id>
		<title>Beard: Created page with &quot;&lt;pre&gt; daemon: 	sshd (sometimes ssh)  packages: 	openssh 	openssh-server 	openssh-clients  config: 	/etc/ssh/sshd_config 	/etc/ssh/ssh_config 	/etc/ssh/ssh_known_hosts 	~/.ssh/...&quot;</title>
		<link rel="alternate" type="text/html" href="https://beardedmaker.com/wiki/index.php?title=Ssh&amp;diff=161&amp;oldid=prev"/>
				<updated>2016-02-29T21:38:00Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; daemon: 	sshd (sometimes ssh)  packages: 	openssh 	openssh-server 	openssh-clients  config: 	/etc/ssh/sshd_config 	/etc/ssh/ssh_config 	/etc/ssh/ssh_known_hosts 	~/.ssh/...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
daemon:&lt;br /&gt;
	sshd (sometimes ssh)&lt;br /&gt;
&lt;br /&gt;
packages:&lt;br /&gt;
	openssh&lt;br /&gt;
	openssh-server&lt;br /&gt;
	openssh-clients&lt;br /&gt;
&lt;br /&gt;
config:&lt;br /&gt;
	/etc/ssh/sshd_config&lt;br /&gt;
	/etc/ssh/ssh_config&lt;br /&gt;
	/etc/ssh/ssh_known_hosts&lt;br /&gt;
	~/.ssh/config&lt;br /&gt;
	~/.ssh/rc&lt;br /&gt;
	~/.ssh/authorized_keys&lt;br /&gt;
	/var/log/secure&lt;br /&gt;
	/var/log/messages&lt;br /&gt;
&lt;br /&gt;
ssh_config:&lt;br /&gt;
&lt;br /&gt;
	CASE SENSATIVE&lt;br /&gt;
&lt;br /&gt;
	arguments:&lt;br /&gt;
		ForwardX11 yes&lt;br /&gt;
		TCPKeepAlive yes (default: yes)&lt;br /&gt;
&lt;br /&gt;
sshd_config:&lt;br /&gt;
&lt;br /&gt;
	CASE SENSATIVE&lt;br /&gt;
&lt;br /&gt;
	arguments:&lt;br /&gt;
		AllowUsers user user - can use * and ?. no need to explicitly deny afterwards.&lt;br /&gt;
		DenyUsers user user&lt;br /&gt;
		AllowGroups group group&lt;br /&gt;
		DenyGroup group group&lt;br /&gt;
		PermitRootLogin no&lt;br /&gt;
		PasswordAuthentication yes (default: yes, change to 'no' for RSA key only)&lt;br /&gt;
		PermitEmptyPassword no (default: no)&lt;br /&gt;
		AuthorizedKeysFile %h/.ssh/authorized_keys&lt;br /&gt;
		RSAAuthentication yes&lt;br /&gt;
		PubkeyAuthentication yes&lt;br /&gt;
		ChrootDirectory /path&lt;br /&gt;
		IgnoreRhosts yes - ignores .rhosts and .shosts. &amp;quot;Yes&amp;quot; is more secure.&lt;br /&gt;
&lt;br /&gt;
		UsePAM yes - default yes&lt;br /&gt;
		StrictModes yes - more secure but may cause permission problems (default: yes)&lt;br /&gt;
		LoginGraceTime &amp;lt;#&amp;gt; - session timeout. default 120. Infinite 0.&lt;br /&gt;
		MaxSessions &amp;lt;#&amp;gt; - default 10&lt;br /&gt;
		MaxAuthTries &amp;lt;#&amp;gt; - default 6&lt;br /&gt;
&lt;br /&gt;
		Banner /path/file.txt&lt;br /&gt;
		X11Forwarding no&lt;br /&gt;
		TCPKeepAlive yes (default: yes)&lt;br /&gt;
&lt;br /&gt;
commands:&lt;br /&gt;
	ssh user@host &amp;lt;command&amp;gt; - user is on remote system. command is optional.&lt;br /&gt;
		-X - run with X11 forwarding&lt;br /&gt;
		-Y - X11 forwarding in &amp;quot;trusted&amp;quot; mode&lt;br /&gt;
		-N - do not execute remote commands&lt;br /&gt;
		-D &amp;lt;port&amp;gt; - opens a port for forwarding traffic. applications may use this port for secure connections. does not open a shell.&lt;br /&gt;
		-C - use compression&lt;br /&gt;
&lt;br /&gt;
	scp - secure copy&lt;br /&gt;
		scp user@from-host:/path/file user@to-host:file&lt;br /&gt;
			to copy to localhost just put file instead of user@to-host:file (or vice versa)&lt;br /&gt;
			-r - recursive&lt;br /&gt;
			-p - preserve&lt;br /&gt;
			-C - compression&lt;br /&gt;
			-p &amp;lt;port&amp;gt; - port&lt;br /&gt;
&lt;br /&gt;
	sftp - secure ftp&lt;br /&gt;
		sftp user@host&lt;br /&gt;
&lt;br /&gt;
	ssh-keygen - create keys, allowing login without password&lt;br /&gt;
		ssh-keygen -t &amp;lt;type&amp;gt; -b &amp;lt;#bits&amp;gt;&lt;br /&gt;
			rsa - default bits: 2048, minimum bits: 768&lt;br /&gt;
			dsa - required bits: 1024&lt;br /&gt;
		will generate private key (~/.ssh/id_rsa) and public key (~/.ssh/id_rsa.pub)&lt;br /&gt;
		copy ~/.ssh/id_rsa.pub to the server as ~/.ssh/authorized_keys&lt;br /&gt;
		done&lt;br /&gt;
&lt;br /&gt;
	ssh-keygen -p - changes password in RSA key (default file: ~/.ssh/id_rsa)&lt;br /&gt;
&lt;br /&gt;
	nohup &amp;lt;command&amp;gt; - runs command on remote machine without disruption from shell disconnection.&lt;br /&gt;
		run while logged in on remote machine.&lt;br /&gt;
		outputs need to be redirected.&lt;br /&gt;
&lt;br /&gt;
RSA key authentication:&lt;br /&gt;
	start on the host from which you will be administering other systems.&lt;br /&gt;
	use 'ssh-keygen -t rsa' to generate keys (use -b &amp;lt;#&amp;gt; to use different number of bits, passphrase optional)&lt;br /&gt;
	copy ~/.ssh/id_rsa.pub to the remote system. could use 'scp ~/.ssh/id_rsa.pub username@host:~'&lt;br /&gt;
	ssh into the remote system using 'ssh username@host'&lt;br /&gt;
	run 'cat ~/id_rsa.pub &amp;gt;&amp;gt; ~/.ssh/authorized_keys' if file already exists. ALWAYS APPEND!&lt;br /&gt;
	edit /etc/ssh/sshd_config (still in remote machine) and edit these lines as follows:&lt;br /&gt;
		PermitRootLogin no&lt;br /&gt;
		PasswordAuthentication no&lt;br /&gt;
		AuthorizedKeysFile %h/.ssh/authorized_keys&lt;br /&gt;
		RSAAuthentication yes&lt;br /&gt;
		PubkeyAuthentication yes&lt;br /&gt;
	restart the daemon (ssh or sshd)&lt;br /&gt;
	exit the ssh session&lt;br /&gt;
	you can now remotely administer the system that has the public key&lt;br /&gt;
	In a GUI shell, sometimes the &amp;quot;Keyring&amp;quot; saves the passphrase for the RSA key.&lt;br /&gt;
&lt;br /&gt;
port forwarding: ?&lt;br /&gt;
	-L &amp;lt;local-port&amp;gt;:&amp;lt;remote-host&amp;gt;:&amp;lt;remote-port&amp;gt; &amp;lt;target-host&amp;gt; - port forwarding from local host (usually use with -N)&lt;br /&gt;
	-R &amp;lt;local-port&amp;gt;:&amp;lt;remote-host&amp;gt;:&amp;lt;remote-port&amp;gt; &amp;lt;target-host&amp;gt; - port forwarding from remote hosts&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Beard</name></author>	</entry>

	</feed>