You can click Save public key as well, but take note: The format PuTTYGen uses when it saves the public key is incompatible with the OpenSSH authorizedkeys files used for SSH key authentication on Linux servers. If you need to see the public key in the right format after the private key has been saved: Open PuTTYgen.
- Puttygen Mac Generate Ssh Key Manager
- Puttygen Mac Generate Ssh Key Github
- Puttygen Mac Generate Ssh Key Linux
- Ssh-keygen -i -f puttygenkey opensshkey then you can copy the contents of opensshkey in to.ssh/authorizedkeys just as with a normal SSH key. The -i option is the one that tells ssh-keygen to do the conversion. The -f option tells it where to find the key to convert. This works for unencrypted keys. The public key is unencrypted, but the.
- PuTTYgen is a key generator tool for creating pairs of public and private SSH keys. It is one of the components of the open-source networking client PuTTY. It is one of the components of the open-source networking client PuTTY.
Connect to a server by using SSH on Linux or Mac OS X
This article provides steps for connecting to a cloud server froma computer running Linux® or MacOS® X by using Secure Shell (SSH).It also discusses generating an SSH key and adding a public key tothe server.
Introduction
SSH is a protocol through which you can access your cloud server and runshell commands. You can use SSH keys to identify trusted computers withoutthe need for passwords and to interact with your servers.
SSH is encrypted with Secure Sockets Layer (SSL), which makes it difficultfor these communications to be intercepted and read.
Note: Many of the commands in this article must be run on your localcomputer. The default commands listed are for the Linux command line orMacOS X Terminal. To make SSH connections from Windows®, you can use a clientsimilar to the free program, PuTTY.To generate keys, you can use a related program, PuTTYGen.
Log in
Using the Internet Protocol (IP) address and password for your cloud server, log in byrunning the following
ssh
command with username@ipaddress
as the argument:The system prompts you to enter the password for the account to which you’reconnecting.
Remote host identification
If you rebuilt your cloud server, you might get the following message:
One of the security features of SSH is that when you log in to a cloudserver, the remote host has its own key that identifies it. When you tryto connect, your SSH client checks the server’s key against any keysthat it has saved from previous connections to that IP address. After yourebuild a cloud server, that remote host key changes, so your computerwarns you of possibly suspicious activity.
To ensure the security of your server, you canuse the web console in the Cloud Control Panel to verify your server’s new key.If you’re confident that you aren’t being spoofed, you can skip thatstep and delete the record of the old SSH host key as follows:
![Generate ssh key github Generate ssh key github](/uploads/1/2/6/0/126048481/781238735.png)
On your local computer, edit the SSH
known_hosts
file and remove anylines that start with your cloud server’s IP address.Note: Use the editor of your choice, such as
nano
on Debian or theUbuntu operating systemor vi
on RPM or CENTOS servers. For simplicity, this article just uses nano
. If you prefer to use vi
,substitute vi
for nano
in the edit commands.For more on using nano
, seehttps://support.rackspace.com/how-to/modify-your-hosts-file/.If you are not using Linux or MacOS X on your local computer, thelocation of the known_hosts file might differ. Refer to your OS forinformation about the file location. PuTTY on Windows gives you theoption to replace the saved host key.
Generate a new SSH key pair
Puttygen Mac Generate Ssh Key Manager
You can secure SSH access to your cloud server against brute forcepassword attacks by using a public-private key pair. A public key is placed onthe server and a matching private key is placed on your local computer. If youconfigure SSH on your server to accept only connections using keys,then no one can log in by using just a password. Connecting clientsare required to use a private key that has a public key registered onthe server. For more on security, reviewLinux server security best practices.
Use the following steps to generate an SSH key pair:
- Run the following command using your email address as a label.Substitute your email address for
[email protected]
inthe command.A message indicates that your public-private RSA key pair isbeing generated.At the prompt, press Enter to use the default location or entera file in which to save the key and press Enter. - If you want the additional security of a password for the key pair,enter a passphraseand press Enter. If you don’t want to use a passwordwith the key pair, press Enter to continue without setting one.Your key pair is generated, and the output looks similar to the following example:
- Optionally, add your new key to the local ssh-agent file to enableSSH to find your key without the need to specify its location everytime that you connect:You can use an SSH configuration shortcut instead of the ssh-agent fileby following the instructions in the Shortcut configuration sectionlater in this article.
Add the public key to your cloud account
To make it easy to add your key to new cloud servers that you create,upload the public key to your cloud account by following these steps:
- Log in to the Cloud Control Panel.
- In the top navigation bar, click Select a Product > Rackspace Cloud.
- Select Servers > SSH Keys.
- Click Add Public Key.
- Enter a key name, such as Work Laptop, to remind you which computer this key is for.
- Select the region for which you want to store the public key. Tostore your key in multiple regions, repeat these steps foreach region. The key must reside in the same region as the server.
- Paste the contents of the id_rsa.pub file that you created intothe Public Key field. You can get the file contents by eitheropening the file in a text editor or by running the followingcommand:
- Click Add Public Key.
If you want to add the key manually, instead of by using the Control Panel, reviewLinux server security best practicesand use the following command:
Create a new server by using a stored key
When you create a new cloud server, you can add a stored key to the newserver.
- On the Create Server page, expand the Advanced Options section.
- From the SSH Key menu, select your key from the list.
- If you don’t see a stored key in the list, you can perform one of the following actions:
- Switch the region for the new server to the region where you have stored the SSH key.
- Repeat the steps in the preceding section, Add the public key to your cloud account,to add the key to the region in which you want to create the new server.
Add the key to an existing server
You can’t use the Cloud Control Panel to add a public key to anexisting server. Follow these steps to add the key manually:
- On your cloud server, create a directory named .ssh in the homefolder of the user that you connect to by using SSH.
- Create or edit the authorized_keys file and add your public key tothe list of authorized keys by using the following command:A key is all on one line, so ensure that the key isn’t broken byline breaks. You can have multiple keys in the authorized_keysfile, with one key per line.
- Set the correct permissions on the key by using the following commands:
- If you have any issues and need to fix permissions issues, run the following comand:
After you have added the public key to the authorized_keys, you can make an SSHconnection by using your key pair instead of the account password.
Shortcut configuration
Use the following instructions to set up a connection shortcut by creating a~/.ssh/config file on your local computer and adding your server and keydetails to it.
- Using a text editor, add the following text to the ~/.ssh/config file, changing thevalues to match your server information:Each of the following entries describes a feature of the server:
- Host: A shortcut name that you use to tell SSH to use thisconnection.
- HostName: The address of the server to which you connect.
- User: The name of the user account to connect to on theserver.
- IdentityFile: The location of the private key file (id_rsa).
- After you set up the config file, connect to the server by usingthe following command with your shortcut name:
Troubleshooting
If you have trouble making a new connection after you restart theserver, use the following steps to help you resolve the issue:
- The best way to troubleshoot SSH or SFTP login issues is to attempt tologin through SSH while logged into the Emergency Console and to watch the log,which typically includes the reason for a failure. If no reason is given,it could be a firewall issue. For RPM servers, run the following command to watch the log:For Debian servers, run the following command to watch the log:
- If you get a
connection timeout
error, check the IP address thatyou used to ensure that it’s correct. You might also check theserver’s iptables to ensure that it isn’t blocking the port used by SSH. - If you get a
connection refused
error, you might be trying to useSSH with the wrong port. If you changed your server to listen to aport other than 22, use the-p
option with SSH to specifythe port. - If your login is rejected, then you might have an issuewith your key. Change the
sshd
configuration to allow passwordconnections by settingPasswordAuthentication
toyes
. Restartthe server and try again. If you connect after these changes, thenthe issue is with the key and you must verify that the key is in theright place on the server. - If all else fails, review your changes and restart the SSH daemon onthe server by running the following command:If you get a message that the SSH service is unknown, run thecommand with
sshd
as the service name instead.
Experience what Rackspace has to offer.
©2020 Rackspace US, Inc.
Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License
On Windows, you can create SSH keys in many ways. This document explains how to use two SSH applications, PuTTY and Git Bash.
Joyent recommends RSA keys because the node-manta CLI programs work with RSA keys both locally and with the ssh agent. DSA keys will work only if the private key is on the same system as the CLI, and not password-protected.
PuTTY
PuTTY is an SSH client for Windows. You can use PuTTY to generate SSH keys. PuTTY is a free open-source terminal emulator that functions much like the Terminal application in macOS in a Windows environment. This section shows you how to manually generate and upload an SSH key when working with PuTTY in the Windows environment.
About PuTTY
PuTTY is an SSH client for Windows that you will use to generate your SSH keys. You can download PuTTY from www.chiark.greenend.org.uk.
When you install the PuTTY client, you also install the PuTTYgen utility. PuTTYgen is what you will use to generate your SSH key for a Windows VM.
This page gives you basic information about using PuTTY and PuTTYgen to log in to your provisioned machine. For more information on PuTTY, see the PuTTY documentation |
---|
Generating an SSH key
To generate an SSH key with PuTTYgen, follow these steps:
- Open the PuTTYgen program.
- For Type of key to generate, select SSH-2 RSA.
- Click the Generate button.
- Move your mouse in the area below the progress bar. When the progress bar is full, PuTTYgen generates your key pair.
- Type a passphrase in the Key passphrase field. Type the same passphrase in the Confirm passphrase field. You can use a key without a passphrase, but this is not recommended.
- Click the Save private key button to save the private key. You must save the private key. You will need it to connect to your machine.
- Right-click in the text field labeled Public key for pasting into OpenSSH authorized_keys file and choose Select All.
- Right-click again in the same text field and choose Copy.
Importing your SSH key
Now you must import the copied SSH key to the portal.
- After you copy the SSH key to the clipboard, return to your account page.
- Choose to Import Public Key and paste your SSH key into the Public Key field.
- In the Key Name field, provide a name for the key. Note: although providing a key name is optional, it is a best practice for ease of managing multiple SSH keys.
- Add the key. It will now appear in your table of keys under SSH.
PuTTY and OpenSSH use different formats of public SSH keys. If the text you pasted in the SSH Key starts with
—— BEGIN SSH2 PUBLIC KEY
, it is in the wrong format. Be sure to follow the instructions carefully. Your key should start with ssh-rsa AAAA…
.Once you upload your SSH key to the portal, you can connect to your virtual machine from Windows through a PuTTY session.
Git Bash
The Git installation package comes with SSH. Using Git Bash, which is the Git command line tool, you can generate SSH key pairs. Git Bash has an SSH client that enables you to connect to and interact with Triton containers on Windows.
To install Git:
- (Download and initiate the Git installer](https://git-scm.com/download/win).
- When prompted, accept the default components by clicking Next.
- Choose the default text editor. If you have Notepad++ installed, select Notepad++ and click Next.
- Select to Use Git from the Windows Command Prompt and click Next.
- Select to Use OpenSSL library and click Next.
- Select to Checkout Windows-style, commit Unix-style line endings and click Next.
- Select to Use MinTTY (The default terminal of mYSYS2) and click Next.
- Accept the default extra option configuration by clicking Install.
When the installation completes, you may need to restart Windows.
Launching GitBash
To open Git Bash, we recommend launching the application from the Windows command prompt:
Puttygen Mac Generate Ssh Key Github
- In Windows, press Start+R to launch the Run dialog.
- Type
C:Program FilesGitbinbash.exe
and press Enter.
Generating SSH keys
First, create the SSH directory and then generate the SSH key pair.
One assumption is that the Windows profile you are using is set up with administrative privileges. Given this, you will be creating the SSH directory at the root of your profile, for example:
Puttygen Mac Generate Ssh Key Linux
- At the Git Bash command line, change into your root directory and type.
- Change into the .ssh directory
C:Usersjoetest.ssh
- To create the keys, type:
- When prompted for a password, type apassword to complete the process. When finished, the output looks similar to:
Uploading an SSH key
To upload the public SSH key to your Triton account:
- Open Triton Service portal, select Account to open the Account Summary page.
- From the SSH section, select Import Public Key.
- Enter a Key Name. Although naming a key is optional, labels are a best practice for managing multiple SSH keys.
- Add your public SSH key.
When Triton finishes the adding or uploading process, the public SSH key appears in the list of SSH keys.
What are my next steps?
- Adding SSH keys to agent.
- Set up the Triton CLI and CloudAPI on Windows.
- Set up the Triton CLI and CloudAPI.
- Create an instance in the Triton Service Portal.
- Set up the
triton-docker
command line tool. - Visit PuTTYgen to learn more about the PuTTYgen and to seethe complete installation and usage guide.