Questions tagged [ssh]

Secure Shell; a network protocol that allows data transfer over a secure channel between two networked devices.

SSH is a network protocol that allows two networked devices to exchange data on a secure channel. SSH was designed as a replacement for the insecure and protocols that send data (including authentication) as plain text.

SSH is most commonly used in Unix-derived systems such as OS X and Linux, mostly already pre-installed. On Microsoft Windows, an SSH client such as PuTTY can be used.

Related tags:

  • , one of the most popular implementations of SSH used today
  • , the SSH daemon which responds to incoming requests
  • , which provides a secure way of storing the passphrase of the private key

Important questions:

Related links:

10440 questions
243
votes
8 answers

How can I avoid SSH's host verification for known hosts?

I get the following prompt everytime I try to connect a server using SSH. I type "yes", but is there a way to aovid this? The authenticity of host '111.222.333.444 (111.222.333.444)' can't be established. RSA key fingerprint is…
shantanuo
  • 2,713
  • 3
  • 21
  • 20
209
votes
7 answers

scp between two remote hosts from my (third) pc

I have two remote hosts. host1-> 10.3.0.1 host2-> 10.3.0.2 Both run an ssh server. The ssh server listens on port 22 in host1 and on port 6969 in host2. Now, using my local machine, I need to copy something from host1 to host2 without logging into…
uwais ibrahim
  • 2,191
  • 2
  • 12
  • 4
205
votes
4 answers

How do you run a SSH server on Mac OS X?

How do you run a ssh server on Mac OS X?
Pablo Fernandez
  • 10,871
  • 23
  • 67
  • 100
199
votes
9 answers

How do I configure SSH so it doesn't try all the identity files automatically?

I have been putting my ssh identity files inside my ~/.ssh/ folder. I have probably about 30 files in there. When I connect to servers, I will specify the identity file to use with something like ssh -i ~/.ssh/client1-identity…
cwd
  • 17,668
  • 42
  • 121
  • 159
190
votes
13 answers

How do I edit text files in the Windows command prompt?

On Unix I'd just use vi, but I don't know what the command is on Windows. I am actually trying to edit files over SSH with Windows Server 2008.
Casebash
  • 7,337
  • 19
  • 68
  • 86
189
votes
5 answers

What's the difference between SCP and SFTP?

Usually, I use the scp command to transfer files on *nixes. What's the difference between SFTP and SCP? Don't they both work on SSH?
nos
  • 4,258
  • 7
  • 35
  • 36
185
votes
10 answers

How do I set up SSH so I don't have to type my password?

How do I set up SSH so I don't have to type my password when connecting to a host?
Richard Hoskins
  • 12,245
  • 10
  • 49
  • 52
179
votes
16 answers

How do I fix a "cannot open display" error when opening an X program after ssh'ing with X11 forwarding enabled?

After launching the X11 app (XQuartz 2.3.6, xorg-server 1.4.2-apple56) on my Mac (OS X 10.6.8), opening an terminal in X11 and running xhost +, I then ssh -Y to my Ubuntu 10.04 VM (running on VMware Fusion). When I run gedit .bashrc (for example),…
Daryl Spitzer
  • 8,585
  • 12
  • 42
  • 38
169
votes
2 answers

How can I tell how many bits my ssh key is?

I already created an ssh key for myself sometime in the past. I don't remember "how many bits" it is. How can I tell? I'm wondering because I'm using hosting at nearlyfreespeech.net and their faq says: Can I configure my ssh connection to use a…
yairchu
  • 1,865
  • 2
  • 12
  • 9
166
votes
7 answers

Don't add hostkey to known_hosts for SSH

I want to connect to a host via SSH but I don't want the hostname to be added to my ~/.ssh/known_hosts. How can I do that?
Albert
  • 6,531
  • 11
  • 39
  • 51
158
votes
10 answers

How to use Mac OS X Keychain with SSH keys?

I understand that since Mac OS X Leopard the Keychain has supported storing SSH keys. Could someone please explain how this feature is supposed to work. I have some RSA keys that I've generated stored in my ~/.ssh directory for accessing various…
John Topley
  • 1,728
  • 3
  • 18
  • 22
155
votes
7 answers

How can I tunnel all of my network traffic through SSH?

Whenever I'm using the internet from an insecure location (such as public wifi) I like to use an ssh tunnel (ssh -D port host) to ensure my traffic can't be sniffed. Unfortunately, there seem to be many applications which do not provide a way to…
Jeremy
  • 1
  • 5
  • 17
  • 44
151
votes
3 answers

Howto force ssh to use a specific private key?

With ssh -i you can instruct ssh to use an extra private key to try authentication. The documentation is not clear on how to explicitly use only that key.
Herman van Rink
  • 3,639
  • 3
  • 12
  • 10
147
votes
9 answers

how to avoid being asked "Enter passphrase for key " when I'm doing ssh operation on a remote host?

I'm ssh into a remote host (linux, fedora) and I want to do ssh operation(git with bitbucket) there. There is ssh-agent running on that machine, $ ps -e|grep sh-agent 2203 ? 00:00:00 ssh-agent but when I want to git, it requires me to enter…
lily
  • 1,735
  • 3
  • 14
  • 14
145
votes
6 answers

SHA256 ssh fingerprint given by the client but only md5 fingerprint known for server

When connecting to a new/unknown server (with recent OpenSSH), for example: ssh example.com You get the fingerprint like below: The authenticity of host 'example.org (192.0.2.42)' can't be established. RSA key fingerprint is…
JonnyJD
  • 3,623
  • 3
  • 18
  • 21