<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackepedia.org/index.php?action=history&amp;feed=atom&amp;title=Ssh-keygen</id>
	<title>Ssh-keygen - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://hackepedia.org/index.php?action=history&amp;feed=atom&amp;title=Ssh-keygen"/>
	<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ssh-keygen&amp;action=history"/>
	<updated>2026-05-08T18:08:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ssh-keygen&amp;diff=1984&amp;oldid=prev</id>
		<title>Franks at 19:30, 13 December 2005</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ssh-keygen&amp;diff=1984&amp;oldid=prev"/>
		<updated>2005-12-13T19:30:26Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;I choose to generate RSA over DSA keys, and I choose 2048 bits instead of the default 1024. Read the [[Manual]] for more options.&lt;br /&gt;
&lt;br /&gt;
 $ ssh-keygen -t rsa -b 2048&lt;br /&gt;
 Generating public/private rsa key pair.&lt;br /&gt;
 Enter file in which to save the key (/home/yashy/.ssh/id_rsa): &lt;br /&gt;
 Enter passphrase (empty for no passphrase): &lt;br /&gt;
 Enter same passphrase again: &lt;br /&gt;
 Your identification has been saved in /home/yashy/.ssh/id_rsa.&lt;br /&gt;
 Your public key has been saved in /home/yashy/.ssh/id_rsa.pub.&lt;br /&gt;
 The key fingerprint is:&lt;br /&gt;
 8f:31:0a:4f:0d:35:87:2b:b8:7b:95:6b:f4:c0:3a:3b yashy@help&lt;br /&gt;
&lt;br /&gt;
Being aware of the security risks, I just enter [Enter] both times it asked me to enter a passphrase, I now I have no passphrase on this key. Once this was completed, I did:&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
  $ cat /home/yashy/.ssh/id_rsa.pub&lt;br /&gt;
  ssh-rsa AAAAB3NzaC1yc2EAAAABromanEA6My5JCmMJX0EoaHX9R7ZE5KQZ7dKxdfirsttQaUx5wMlnweF6MLWbU2tzJ1aZMr8jyL7e+empireB52ZKNDhs1amr8X6+e/L9UQX8OKKzcZyUj8rO8QTdw+vsgk8IQbiMO1GYYWVHw9HO0lYUmZTWFGTe0rSRu/mSRuNpsoVO80nWNbnP0wUa0YrGPyPMIoyIpo/BKUpSjHUSLUiC7KuSsDmVxMFuanvYsx79yx0KjRmXn73AdbH+VzSdlhC/5GIFnqbY2eZ6PeNmhAAspya62Wsc4caSrdE85Kp/TMwUZB4yF90VBG7mJjL+HZSIiO5irIM2HXDZaMVZe+iS5DoboEYaiA7DJuatR9KZ8+JeQ== yashy@help&lt;br /&gt;
&lt;br /&gt;
Now I take that one really long line and copy it, and paste it into the remote host as a file called /home/yashy/.ssh/authorized_keys. Once I&amp;#039;ve done that, I can now ssh to the remote host doing a key exchange instead of entering a password. Unless you&amp;#039;re aware of the risks, you&amp;#039;re a lot safer to have entered a password during the key generation process. Enjoy!&lt;/div&gt;</summary>
		<author><name>Franks</name></author>
	</entry>
</feed>