Shortcut for adding SSH keys

If you’ve dabbled with SSH much, for example by following the excellent tutorial a few years ago, you’ll know about adding keys to allow passwordless login (or, if you prefer, a passphrase) using public key authentication. Specifically, you copy the public key ~/.ssh/ or ~/.ssh/ off the machine from which you wish to connect into the /.ssh/authorized_keys file on the target machine. That will allow you to open an SSH session with the machine from the user account on the local machine to the one on the remote machine, without having to type in a password.

tom@conan:~$ scp ~/.ssh/ crom:.ssh/conan.pubkey
tom@conan:~$ ssh crom
tom@crom:~$ cd .ssh
tom@crom:~$ cat .ssh/conan.pubkey >>~/.ssh/authorized_keys

However, there’s a nice shortcut that I didn’t know about when I first learned how to do this, which has since been added to that tutorial too — specifically, the ssh-copy-id tool, which is available in most modern OpenSSH distributions and combines this all into one less error-prone step. If you have it available to you, it’s definitely a much better way to add authorized keys onto a remote machine.

tom@conan:~$ ssh-copy-id crom

Incidentally, this isn’t just good for convenience or for automated processes; strong security policies for publically accessible servers might disallow logging in via passwords completely, as usernames and passwords can be guessed. It’s a lot harder to guess an entire SSH key, so forcing this login method will reduce your risk of script kiddies or automated attacks brute-forcing your OpenSSH server to zero. You can arrange this by setting ChallengeResponseAuthentication to no in your sshd_config, but if that’s a remote server, be careful not to lock yourself out!

3 thoughts on “Shortcut for adding SSH keys

  1. Nice tip, but I wouldn’t say to zero. A little bit overconfident there. Really digging the blog posts though, well laid out and explained thoroughly, which is what I try to do in my blog too.

    • No, it’s not impossible, but under the assumptions of proper implementation of the algorithms and a key of suitable length (2048 bit RSA) it may as well be. No script kiddie is ever going to brute force that. Of course, exploits in the SSH daemon itself would be quite another matter.

  2. Pingback: Criptografia no Linux | Elite Linux

Leave a Reply

Your email address will not be published. Required fields are marked *

You can use Markdown if you want.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>