Solved

Can find rsa key

Posted on 2014-01-18
9
416 Views
Last Modified: 2014-01-18
(Ubuntu 11.04)
I'm following this guide:
https://help.github.com/articles/generating-ssh-keys

I get to the bit in the article where it says:
Your identification has been saved in /c/Users/you/.ssh/id_rsa.
# Your public key has been saved in /c/Users/you/.ssh/id_rsa.pub.
# The key fingerprint is:
# 01:0f:f4:3b:ca:85:d6:17:a1:7d:f0:68:9d:f0:a2:db your_email@example.com

Open in new window

I run the command and get that output, (except I'm logged in as 'root'), but when I try the next line:
clip < ~/.ssh/id_rsa.pub, its says the file doesn't exist. It is there (with ls) but when I nano it, it appears to be empty??
I'm so crap with Linux I'm not sure if I'm looking at the one i just created though...
0
Comment
Question by:Silas2
  • 5
  • 3
9 Comments
 
LVL 34

Expert Comment

by:Dan Craciun
ID: 39790864
c:\users\you\.ssh\id_rsa is a Windows path.

~/.ssh/id_rsa.pub is a linux path. Usually it means /home/you/.ssh/id_rsa.pub

You'll have to decide on what system you're working on.

HTH,
Dan
0
 

Author Comment

by:Silas2
ID: 39790874
I'm struggling with one of each at both ends....
0
 

Author Comment

by:Silas2
ID: 39790884
This is the command I ran:
root@mail:~# cd ~/.ssh
root@mail:~/.ssh# ls
known_hosts
root@mail:~/.ssh# ssh-keygen -t rsa -C "myemail@hotmail.com"

Open in new window

It seemed to run ok and some extra files appeared in the ~/.ssh folder:
 ssh-add id_rsa  ssh-add id_rsa.pub
But they all seem to be empty, am I missing something?
0
 
LVL 19

Expert Comment

by:Patricksr1972
ID: 39790895
*edit*

You generate the keys on windows or on Linux? i see two sets of requests on 2 different machines.

Which machine is going to generate the keys?
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:Silas2
ID: 39790911
that's on the Ubuntu box...
0
 

Author Comment

by:Silas2
ID: 39790959
Sorry to ask a stoopid question but if, as ssh supports the public/private key encryption by default, what is the big advantage of creating these symmetric private keys?
0
 
LVL 19

Accepted Solution

by:
Patricksr1972 earned 250 total points
ID: 39790978
ssh supports encryption through the use of a certificate pair.
basicly the server you want to ssh to needs to hold the private key.

So if you need two sets of keys i assume you want to ssh in the the ubuntu box from windows and vice versa... if not then you do not need 2 sets
0
 

Author Comment

by:Silas2
ID: 39790986
hmm, that's true, I'm trying to setup git hub at an Ubuntu box I've got at Rackspace, the linux box is really only for pushing to, and pulling from, not from working on, so I guess I don't need the symmetric keys, that would be right then would it?
0
 
LVL 19

Expert Comment

by:Patricksr1972
ID: 39791027
Yes thats right
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SSH2 on Windows 7 machine 7 275
IIS and windows 10 5 166
Allow some users from certain IP access to openssh on AIX. 5 64
Access ESXi DCUI with Putty 5 81
Secure Shell (SSH) is a network protocol for secure data communication, mainly used to administer remote Unix / Linux servers via command line. But it also allows the user to open a secure tunnel between a client and a server where he can send any k…
Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now