About 2,870,000 results
Open links in new tab
  1. ssh - How to find Private Key Location - Stack Overflow

    I'm trying to access a server using Filezilla and was told I needed to use authentication with public/private keys. I created the keys using the Terminal, but cannot find them on my computer. Thi...

  2. How to force ssh to use a specific private key? - Super User

    With ssh -i <private key filename> you can instruct ssh to use an extra private key to try authentication. The documentation is not clear on how to explicitly use only that key.

  3. openssh - How to ssh to remote server using a private key? - Unix ...

    Oct 25, 2011 · However, I would be creating a bash script from server 1 that will execute some commands on server 2 via SSH. How do I SSH to Server 2 using my private key file from Server 1?

  4. ssh - How to tell git which private key to use? - Super User

    ssh has the -i option to tell which private key file to use when authenticating: -i identity_file Selects a file from which the identity (private key) for RSA or DSA authentication is read. The default is ~/.ssh/identity for protocol version 1, and ~/.ssh/id_rsa and ~/.ssh/id_dsa for protocol version 2. Identity files may also be specified on a per-host basis in the configuration file. It is ...

  5. ssh - What is actually in known_hosts? - Stack Overflow

    Oct 21, 2015 · the SSH algorithm negotiation involves a key exchange state machine which begins when the SSH_MSG_KEXINIT message along with algorithms list is sent. The key exchange method or simply kex specifies session keys for encryption and host authentication host public keys (ssh-rsa, ssh-dss ..) that are sent to the client.

  6. ssh - How can I find a list of MACs, Ciphers, and KexAlgorithms …

    Jan 24, 2015 · Is there a way to make ssh output what MACs, Ciphers, and KexAlgorithms that it supports? I'd like to find out dynamically instead of having to look at the source.

  7. ssh - Meaning of “Connection closed by xxx [preauth]” in sshd logs ...

    I added an SSH key to the Google Cloud Platform VM, and it picked the username and saved the key under it, while I thought it was merely a metadata key, and was attempting to connect with the standard username "admin". Logging in via the web SSH and manually looking for the right .ssh/authorized_keys file has helped me reveal the issue.

  8. Location of OpenSSH configuration file on Windows - Super User

    Apr 1, 2020 · How do I set the host name and port in a config file for Windows, using OpenSSH through PowerShell? As on Unix/Linux: Edit or create the file now by typing: nano ~/.ssh/config In here,...

  9. What is a SSH key fingerprint and how is it generated?

    May 8, 2012 · The fingerprint is based on the host's public key, usually based on the /etc/ssh/ssh_host_rsa_key.pub file. Generally it's for easy identification/verification of the host you are connecting to.

  10. ssh - How to enable diffie-hellman-group1-sha1 key exchange on …

    I am unable to ssh to a server that asks for a diffie-hellman-group1-sha1 key exchange method: ssh 123.123.123.123 Unable to negotiate with 123.123.123.123 port 22: no matching key exchange method...