Mar 31, 2011

SSH without passwords (Public/Private Keys)

Secure Public/Private Key Cryptography isn’t exactly new stuff in the world of Computing. It makes our world go round. It is the basis for secure communication in today’s world. HTTPS, SSL, TLS, SSH are all cryptographic protocols that use Public/Private key infrastructures. Without these protocols, we would think twice about using credit card, banking or any other sensitive information on the Internet.

We all know that passwords aren’t very secure.  If you choose a password that is easy to remember then its easier to guess via brute force.  If you choose a password that is random or hard to remember then you are more likely to write it down.  Any well-versed digital community member already has many username/password credentials to remember so we are less likely to remember extremely difficult random passwords.  This is the password paradox, which leads me to look into managing access via public/private key pairs instead.

Generate a public/private key pair (if you don’t have one already)

Github has an excellent tutorial with good illustrations on how to generate ssh keys with ssh-keygen, but here is an overview:

  • *Backup your existing keys* — if they exists so that you don’t overwrite them.
  • generate a new key with ssh-keygen

Definitely setup a passphrase! – Its like a password for your private key.  The passphrase is a second line of defence if anyone were to acquire your private key.

The .pub is your public key, you can safely share this anywhere, whereas the private key is entirely private!  DO NOT show anyone, don’t copy it anywhere and only securely back it up.. This is your new password and large liability if it fell into the wrong hands.

Example:
Some folks like to generate and manage keypairs for each location, or at least manage certain levels of keys, but I’m not going to dive into that topic.

Configure the Server (if needed)

Make sure that the server has Public key authentication enabled (most do). for OpenSSH it would be the following in the sshd_config:

RSAAuthentication yes
PubkeyAuthentication yes
AuthorizedKeysFile .ssh/authorized_keys

Then all you have to do is:

  • Put your public key (the one ending in .pub) as a line in the ~/.ssh/authorized_keys file (create it if it doesn’t exist)
  • Restart your SSH server
  • Log in without being prompted for a password

This is really handy for managing servers especially on Amazon’s EC2, local access between machines, SFTP, SSH tunneling, or even getting access to a jailbroken iPhone or any other device with OpenSSH installed on it.

The guys over at debian-administrator.org wrote a good guide to Password-less logins with OpenSSH that is worth looking into if you have issues or want to dive deeper.

Passwords aren’t very secure, you already know this. If you use one that’s easy to remember, it’s easier to guess or brute-force (try many options until one works). If you use one that’s random it’s hard to remember, and thus you’re more inclined to write the password down. Both of these are Very Bad Things™. This is why you’re using ssh keys.

About the Author

Object Partners profile.

One thought on “SSH without passwords (Public/Private Keys)

  1. Bobby Warner says:

    Slicehost has pretty good tutorials about using SSH without passwords too. They have them for each major Linux distro. Here’s the Ubuntu one: http://articles.slicehost.com/2010/10/18/ubuntu-maverick-setup-part-1

  2. Marco Vermeulen showed me the ‘ssh-copy-id’ command that automatically handles the adding of ssh certs to the authorized_keys of a remote box for you!

Leave a Reply to Colin Harrington Cancel reply

Your email address will not be published.

Related Blog Posts
Natively Compiled Java on Google App Engine
Google App Engine is a platform-as-a-service product that is marketed as a way to get your applications into the cloud without necessarily knowing all of the infrastructure bits and pieces to do so. Google App […]
Building Better Data Visualization Experiences: Part 2 of 2
If you don't have a Ph.D. in data science, the raw data might be difficult to comprehend. This is where data visualization comes in.
Unleashing Feature Flags onto Kafka Consumers
Feature flags are a tool to strategically enable or disable functionality at runtime. They are often used to drive different user experiences but can also be useful in real-time data systems. In this post, we’ll […]
A security model for developers
Software security is more important than ever, but developing secure applications is more confusing than ever. TLS, mTLS, RBAC, SAML, OAUTH, OWASP, GDPR, SASL, RSA, JWT, cookie, attack vector, DDoS, firewall, VPN, security groups, exploit, […]