Overview

This guide will help you configure your ssh client.

Prerequisites

Configuring the ssh client

Generating a keypair

If you don’t have a public/private keypair, you will need to generate one.

You can do this using the ssh-keygen tool on the local machine.

ssh-keygen -t ed25519

Follow the instructions and fill out your details. You should password protect the private key.

You should now have a private key at ~/.ssh/id_ed25519 and a corresponding public key at ~/.ssh/id_ed25519.pub.

Do not move the private key.

The private key is PRIVATE. It should not leave the device and should not be shared.

Distributing the public key

The public key generated in the step above should be distributed to the hosts to which you want to provide access using the private key. This can safely be done copying the public key data via a public channel.

Once on the hosts you should add this key to the list of ~/.ssh/authorized_keys. For more information on how configure ssh access to a machine, see: How to configure the ssh daemon.

Connecting to servers

To connect to a remote machine via ssh you can do:

ssh user@host

Substitute in the user and host you want to connect to. You will be prompted for your ssh key password. You will then be connected over ssh and able to issue commands to the remote shell.

Saving connection configuration

You can save your connection configuration using the ssh client config file. This is located at ~/.ssh/config.

This file contains hosts for which you want to save the connection information. This makes it simple to connect with a simple ssh rpi5b.

An example for the ~/.ssh/config file looks like:

# Raspberry Pi 5 (remote)
Host rpi5b
User liam
HostName rpi5b
IdentityFile ~/.ssh/id_ed25519
 
# More entries...

Remembering known hosts

On the first connection to a remote machine, you will be shown a fingerprint and asked to confirm the host is who you think it is.

Always verify the fingerprint.

You should always verify the fingerprint before trusting the remote. While the remote knows you have your private key, this is the step where you must manually validate the remote’s private key. You must be sure the computer you’re connecting to is in-fact the computer you think it is.

This is an important security step. DO NOT SKIP.