Solved

ssh config file

Posted on 2004-04-03
5
1,037 Views
Last Modified: 2013-11-18
I have a RedHat distribution of linux installed (FedoraCore1) on my home machine and am looking for an ssh config file in ~/.ssh/config.   However, I cannot find this file on my machine.   Isn't this thing preinstalled or do I have to download or obtain it in some other way?   How can I get this file?   Please let me know.
0
Comment
Question by:skyblue01
  • 2
  • 2
5 Comments
 
LVL 40

Accepted Solution

by:
jlevie earned 150 total points
ID: 10749145
You won't have a ~/.ssh/config unless you create one. The global client config file is /etc/ssh/ssh_config, which you can copy to ~/.ssh/config and edit to your liking.
0
 

Author Comment

by:skyblue01
ID: 10749528
By copying, do you mean moving the same exact file to ~/.ssh/?   In that case, do I create a dir called .ssh?   Or do I copy and paste the content to a new text file and name it config and place it in ~/.ssh?

I am not sure of your copying process since I don't have a ~/.ssh directory on my machine and it sounds like it's not something I should be creating...
0
 
LVL 17

Assisted Solution

by:owensleftfoot
owensleftfoot earned 50 total points
ID: 10749606
Type "cd" (without the quotes) to return to your home directory. Type "mkdir .ssh" to create the ssh directory in your home directory. Create/edit a config file in this directory.
0
 
LVL 40

Expert Comment

by:jlevie
ID: 10749607
the .ssh directory will be created the first time you use ssh, scp, or sftp.  You can create the directory before using any of the SSH client programs with:

cd ~/
mkdir .ssh
chmod 700 .ssh

In general, the defaults in the sitewide ssh_config file are suitable for most users. Before going to the trouble of creating a personal config in .ssh/config I'd suggest that you go through the global config and see if yu really need any customizations.
0
 

Author Comment

by:skyblue01
ID: 10749745
k.   i'll try that, thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Shoutout to Emily Plummer (http://www.experts-exchange.com/members/eplummer26.html) for giving me this article! She did most of it, I just finished it up and posted it for her :)    Introduction In a previous article (http://www.experts-exchang…
JavaScript has plenty of pieces of code people often just copy/paste from somewhere but never quite fully understand. Self-Executing functions are just one good example that I'll try to demystify here.
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
The viewer will receive an overview of the basics of CSS showing inline styles. In the head tags set up your style tags: (CODE) Reference the nav tag and set your properties.: (CODE) Set the reference for the UL element and styles for it to ensu…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now