Questions tagged [ssh]

GENERAL SSH SUPPORT IS OFF-TOPIC. Support questions may be asked on https://superuser.com. Secure Shell (SSH) is a cryptographic network protocol for secure data communication. Use this tag for programming questions related to Secure Shell. Common authentication and configuration problems are off-topic for Stack Overflow.

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client (running SSH server and SSH client programs, respectively). The protocol specification distinguishes two major versions that are referred to as SSH-1 and SSH-2.

SSH was designed as a replacement for Telnet and other insecure remote shell protocols such as the Berkeley rsh and rexec protocols, which send information, notably passwords, in plaintext, rendering them susceptible to interception and disclosure using packet analysis. The encryption used by SSH is intended to provide confidentiality and integrity of data over an unsecured network, such as the Internet, although files leaked by Edward Snowden indicate that the National Security Agency can sometimes decrypt SSH.

SSH uses public-key cryptography to authenticate the remote computer and allow it to authenticate the user, if necessary. There are several ways to use SSH; one is to use automatically generated public-private key pairs to simply encrypt a network connection and then use password authentication to log on.

Another is to use a manually generated public-private key pair to perform the authentication. This method allows users or programs to log in without having to specify a password. Anyone can produce a matching pair of different keys (public and private). The public key is placed on all computers that must allow access to the owner of the matching private key (the owner keeps the private key secret). Although authentication is based on the private key, the key itself is never transferred through the network during authentication. SSH only verifies whether the same person offering the public key also owns the matching private key.

In all versions of SSH it is important to verify unknown public keys, i.e. associate the public keys with identities, before accepting them as valid. Accepting an attacker's public key without validation will authorize an unauthorized attacker as a valid user.

Useful Links

Server Implementations

Client Implementations

Libraries

29979 questions
10
votes
1 answer

Docker+SSH, how to transfer docker images from one host to another securely on a regular basis?

I would like to use ssh as a transport mechanism for transferring docker images hosted in corporate network to private cloud. Setting up VPN connections would not be my first choice (as it just adds to the complexity). Any ideas where to look/start…
geoaxis
  • 1,480
  • 6
  • 25
  • 46
10
votes
3 answers

Visual studio + explore sftp

I'm looking for a way to develope using Visual studio 2013 on a remote server, using only sftp/ssh(browsing the remote folder in solution explorer, and uploding file using ctrl+s). I know it's possible to open a simple ftp site using File>Open…
MoLow
  • 3,056
  • 2
  • 21
  • 41
10
votes
1 answer

Command to create ssh config file using git bash(windows)?

I could only find details about configuring the config file, but i could no where find how to create a config file manually. I have generated rsa key, which is under .ssh folder but i couldn't find the config file being created there.
ikiw
  • 372
  • 1
  • 4
  • 17
10
votes
2 answers

java.sql.Connection extension for SSH

I have a MySQL database behind a firewall which can only be accessed via an SSH connection. Does anyone know of an implementation of java.sql.Connection which would allow me to make an SSH connection to this database?
Elie
  • 13,693
  • 23
  • 74
  • 128
10
votes
1 answer

Cannot SSH using private key while building Docker image

I'm having trouble checking out a private git repository hosted on GitHub during a Docker image build. The error from SSH in verbose mode is: OpenSSH_6.6.1, OpenSSL 1.0.1f 6 Jan 2014 debug1: Reading configuration data /etc/ssh/ssh_config debug1:…
Andy Shinn
  • 26,561
  • 8
  • 75
  • 93
10
votes
1 answer

seq uses comma as decimal separator

I have noticed a strange seq behavior on one of my computers (Ubuntu LTS 14.04): instead of using points as decimal separator it is using commas: seq 0. 0.1 0.2 0,0 0,1 0,2 The same version of seq (8.21) on my other PC gives the normal points (also…
Miguel
  • 7,497
  • 2
  • 27
  • 46
10
votes
7 answers

Meteor Up deployment, can't use meteor mongo --url

I've recently deployed my Meteor app to a Digital Ocean droplet running Ubuntu 14.04 x32. I used Meteor Up with this mup.json file: { // Server authentication info "servers": [ { "host": "mycorrecthostname", "username": "root", …
blaineh
  • 2,263
  • 3
  • 28
  • 46
10
votes
4 answers

Using su/sudo when accessing remote Git repositories over SSH

Suppose that there is a remote Git repository R on a Linux server. R is owned by a user U for which a remote login via SSH is not allowed at all (e.g. root). Neither password-based nor key-based authentication is available for that user. What is…
thkala
  • 84,049
  • 23
  • 157
  • 201
10
votes
4 answers

Paramiko Python: IOError: [Errno 13] Permission denied

The Question: Can I do something like: self.sftp.put(sourceFilePath, final_destination, use_sudo=True) I can make folders, but not files? Do I need to explicitly call sudo or set something in paramiko? Should I be copying the file to a permissable…
jmunsch
  • 22,771
  • 11
  • 93
  • 114
10
votes
6 answers

Capistrano and GitHub Private Repo – Permission denied (publickey)

I've inherited a Rails project, hosted on Linode. The previous developer was using a BitBucket repository, along with Capistrano for deployments. I've since setup a private repository on GitHub, and I'm trying to get the Capistrano recipe to work.…
cmw
  • 946
  • 2
  • 11
  • 26
10
votes
2 answers

Capistrano 3 deploy asking for SSH passphrase but cannot type it in

I'm trying to use Capistrano 3 to deploy a Rails 4 application. #config valid only for Capistrano 3.1 lock '3.1.0' set :application, 'testapp' set :scm, :git set :repo_url, 'git@bitbucket.org:sergiotapia/testapp.git' set :user, "deploy" # The user…
sergserg
  • 21,716
  • 41
  • 129
  • 182
10
votes
1 answer

In Sublime 3, can I use project settings to disable packages?

EDIT: Question is about Sublime 3. Edited title for clarity. I have a couple of projects that require me to connect through SSH. This is fine except that SublimeLinter-php and GitGutter execute extremely slowly over SSH. Obviously, I can manually…
Trip
  • 2,018
  • 15
  • 27
10
votes
5 answers

Vagrant SSH Tunnelling after using `vagrant ssh`

My MySQL client (Sequel Pro) is set up to connect to Vagrant over SSH. I've setup the following in my ~/.ssh/config file: Host vagrant HostName 127.0.0.1 CheckHostIP no Port 2222 User vagrant IdentityFile…
10
votes
3 answers

Configure Git with SSH for Phabricator

I'm trying to configure SSH for Phabricator to get git running. I've followed this manual but when I call echo {} | ssh git@phabricator.mydomain.com conduit conduit.ping I always get an empty result or Permission denied…
witrin
  • 3,701
  • 1
  • 24
  • 49
10
votes
8 answers

SFTP into Google Compute Engine

I have been playing around with Debian on Compute Engine and was wondering how I could SFTP into the server. I can't find any documentation on it and was hoping someone could point me in the right direction. Thanks! If this isn't possible, is the…
user1156994
  • 101
  • 1
  • 1
  • 5
1 2 3
99
100