<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://performiq.com/kb/index.php?action=history&amp;feed=atom&amp;title=InfoInfo_-_ssh</id>
	<title>InfoInfo - ssh - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://performiq.com/kb/index.php?action=history&amp;feed=atom&amp;title=InfoInfo_-_ssh"/>
	<link rel="alternate" type="text/html" href="https://performiq.com/kb/index.php?title=InfoInfo_-_ssh&amp;action=history"/>
	<updated>2026-05-18T20:46:42Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.37.1</generator>
	<entry>
		<id>https://performiq.com/kb/index.php?title=InfoInfo_-_ssh&amp;diff=2942&amp;oldid=prev</id>
		<title>PeterHarding at 05:23, 4 February 2009</title>
		<link rel="alternate" type="text/html" href="https://performiq.com/kb/index.php?title=InfoInfo_-_ssh&amp;diff=2942&amp;oldid=prev"/>
		<updated>2009-02-04T05:23:06Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 15:23, 4 February 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l53&quot;&gt;Line 53:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 53:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;private key and can access Sudo or whatever else may require an actual&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;private key and can access Sudo or whatever else may require an actual&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;system password for authentication.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;system password for authentication.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[category:OpenSSL]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Category:Network]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>PeterHarding</name></author>
	</entry>
	<entry>
		<id>https://performiq.com/kb/index.php?title=InfoInfo_-_ssh&amp;diff=386&amp;oldid=prev</id>
		<title>PeterHarding: New page: = Set up user accounts quickly and securely = == Vincent Danen, TechRepublic ==  When you need to set up a user account to give a user shell access to the system, the only logical choice o...</title>
		<link rel="alternate" type="text/html" href="https://performiq.com/kb/index.php?title=InfoInfo_-_ssh&amp;diff=386&amp;oldid=prev"/>
		<updated>2007-12-12T02:33:07Z</updated>

		<summary type="html">&lt;p&gt;New page: = Set up user accounts quickly and securely = == Vincent Danen, TechRepublic ==  When you need to set up a user account to give a user shell access to the system, the only logical choice o...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Set up user accounts quickly and securely =&lt;br /&gt;
== Vincent Danen, TechRepublic ==&lt;br /&gt;
&lt;br /&gt;
When you need to set up a user account to give a user shell access to the&lt;br /&gt;
system, the only logical choice of login tool is OpenSSH. With SSH keys,&lt;br /&gt;
all you need from the user is his SSH public key, and all he needs from&lt;br /&gt;
you is the IP address or hostname with which to log in. Usually, this is&lt;br /&gt;
sufficient. &lt;br /&gt;
&lt;br /&gt;
In some cases, the user may need to know what his own password is. If he&lt;br /&gt;
needs to use Sudo, he will need to authenticate with a password. Ideally,&lt;br /&gt;
this information would be given via phone or encrypted e-mail, but more&lt;br /&gt;
often than not, the password itself is handed out via plain-text e-mail. &lt;br /&gt;
&lt;br /&gt;
The ideal situation would be to create the user account, obtain the user&amp;#039;s&lt;br /&gt;
public SSH key (which can be sent unencrypted as it does an attacker no&lt;br /&gt;
good in and of itself), and generate a random password for the user to&lt;br /&gt;
change once he logs into the system. This is all easily accomplished. &lt;br /&gt;
&lt;br /&gt;
For the user, this is very easy. To create the private/public keypair,&lt;br /&gt;
simply execute: &lt;br /&gt;
&lt;br /&gt;
 $ ssh-keygen -t dsa&lt;br /&gt;
&lt;br /&gt;
You would then have him send the ~/.ssh/id_dsa.pub file. Server-side,&lt;br /&gt;
things become more interesting, but certainly not difficult. First, you&lt;br /&gt;
create the user account: &lt;br /&gt;
&lt;br /&gt;
 # useradd -c &amp;quot;Joe User&amp;quot; -s /bin/bash -m joe&lt;br /&gt;
 # openssl rand -base64 6 | tee -a ~joe/.password | passwd -stdin joe&lt;br /&gt;
&lt;br /&gt;
This will create the user joe, assign it a random password, and store the&lt;br /&gt;
same password in ~joe/.password, where joe will be able to see it. &lt;br /&gt;
&lt;br /&gt;
If you lock down accounts via /etc/ssh/sshd_config, remember to allow joe&lt;br /&gt;
access to the system by adding: &lt;br /&gt;
&lt;br /&gt;
 AllowUsers joe&lt;br /&gt;
&lt;br /&gt;
Also, ensure that PasswordAuthentication is set to no as well, to force&lt;br /&gt;
all logins to use public keys. &lt;br /&gt;
&lt;br /&gt;
Finally, be sure to copy the id_dsa.pub key to the user&amp;#039;s home directory&lt;br /&gt;
and give appropriate ownership and permissions: &lt;br /&gt;
&lt;br /&gt;
 # mkdir ~joe/.ssh&lt;br /&gt;
 # chmod 700 ~joe/.ssh&lt;br /&gt;
 # cp id_dsa.pub ~joe/.ssh/authorized_keys&lt;br /&gt;
 # chmod 600 ~joe/.ssh/authorized_keys&lt;br /&gt;
 # chown -R joe:joe ~joe/.ssh&lt;br /&gt;
&lt;br /&gt;
And that&amp;#039;s all there is to it. Now the user can log in using his SSH&lt;br /&gt;
private key and can access Sudo or whatever else may require an actual&lt;br /&gt;
system password for authentication.&lt;/div&gt;</summary>
		<author><name>PeterHarding</name></author>
	</entry>
</feed>