Solved

Can find rsa key

Posted on 2014-01-18
9
423 Views
Last Modified: 2014-01-18
(Ubuntu 11.04)
I'm following this guide:
https://help.github.com/articles/generating-ssh-keys

I get to the bit in the article where it says:
Your identification has been saved in /c/Users/you/.ssh/id_rsa.
# Your public key has been saved in /c/Users/you/.ssh/id_rsa.pub.
# The key fingerprint is:
# 01:0f:f4:3b:ca:85:d6:17:a1:7d:f0:68:9d:f0:a2:db your_email@example.com

Open in new window

I run the command and get that output, (except I'm logged in as 'root'), but when I try the next line:
clip < ~/.ssh/id_rsa.pub, its says the file doesn't exist. It is there (with ls) but when I nano it, it appears to be empty??
I'm so crap with Linux I'm not sure if I'm looking at the one i just created though...
0
Comment
Question by:Silas2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
9 Comments
 
LVL 35

Expert Comment

by:Dan Craciun
ID: 39790864
c:\users\you\.ssh\id_rsa is a Windows path.

~/.ssh/id_rsa.pub is a linux path. Usually it means /home/you/.ssh/id_rsa.pub

You'll have to decide on what system you're working on.

HTH,
Dan
0
 

Author Comment

by:Silas2
ID: 39790874
I'm struggling with one of each at both ends....
0
 

Author Comment

by:Silas2
ID: 39790884
This is the command I ran:
root@mail:~# cd ~/.ssh
root@mail:~/.ssh# ls
known_hosts
root@mail:~/.ssh# ssh-keygen -t rsa -C "myemail@hotmail.com"

Open in new window

It seemed to run ok and some extra files appeared in the ~/.ssh folder:
 ssh-add id_rsa  ssh-add id_rsa.pub
But they all seem to be empty, am I missing something?
0
Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39790895
*edit*

You generate the keys on windows or on Linux? i see two sets of requests on 2 different machines.

Which machine is going to generate the keys?
0
 

Author Comment

by:Silas2
ID: 39790911
that's on the Ubuntu box...
0
 

Author Comment

by:Silas2
ID: 39790959
Sorry to ask a stoopid question but if, as ssh supports the public/private key encryption by default, what is the big advantage of creating these symmetric private keys?
0
 
LVL 23

Accepted Solution

by:
Patrick Bogers earned 250 total points
ID: 39790978
ssh supports encryption through the use of a certificate pair.
basicly the server you want to ssh to needs to hold the private key.

So if you need two sets of keys i assume you want to ssh in the the ubuntu box from windows and vice versa... if not then you do not need 2 sets
0
 

Author Comment

by:Silas2
ID: 39790986
hmm, that's true, I'm trying to setup git hub at an Ubuntu box I've got at Rackspace, the linux box is really only for pushing to, and pulling from, not from working on, so I guess I don't need the symmetric keys, that would be right then would it?
0
 
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39791027
Yes thats right
0

Featured Post

Enroll in July's Course of the Month

July's Course of the Month is now available! Enroll to learn HTML5 and prepare for certification. It's free for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question