Changes

Jump to: navigation, search

SSH

238 bytes added, 21:03, 8 September 2021
Creating a Public/Private Key Pair
{{Admon/note|OpenSSH Assumed|These instructions assume a Linux or Mac OS/X system running OpenSSH. Other SSH clients will have different procedures, and you'll need to check that the key produced is in OpenSSH format (you can convert key types using the <code>ssh-keygen</code> command on a Linux system such as Matrix if needed).}}
# Enter this command: <code>ssh-keygen-ted25519</code>
#* Answer the questions asked by ssh-keygen. Use default values for most questions. The use of a passphrase is '''strongly''' recommended. Avoid changing the filename from the default (unless there is a really good reason), because the location, name, and permission of keys is critical.
#* ssh-keygen will produce two files:
#** <code>~/.ssh/id_rsaid_ed25519</code> - your private key#** <code>~/.ssh/id_rsaid_ed25519.pub</code> - your public key{{Admon/tip|Key Type and Length|ssh-keygen can generate two multiple types of keys: , including rsa , dsa, ecdsa, and dsaed25519. Either type Any of these types serves the same purpose, and rsa/dsa can be generated with varying key lengths. The longer the key, the more difficult it is to break the key by guessing it (trying successive values until the right key is found) - each bit added to the key doubles the number of possible key values. Key lengths of 1024-4096 bits are considered reasonably secure; as computers become faster, key lengths should be increased. Better yet, use the ed25519 eliptic curve option, which is considered the most secure format supported by the current OpenSSH implementation (8.4 as of the time of writing).}} 
=== Sending the Public Key to a Remote System Administrator ===

Navigation menu