{"id":77,"date":"2009-08-06T11:32:23","date_gmt":"2009-08-06T16:32:23","guid":{"rendered":"http:\/\/www.thedarktimes.us\/wordpress\/?p=77"},"modified":"2009-08-06T11:32:23","modified_gmt":"2009-08-06T16:32:23","slug":"ssh-copy-id","status":"publish","type":"post","link":"https:\/\/www.thedarktimes.us\/wordpress\/linux\/ssh-copy-id\/%20","title":{"rendered":"SSH-COPY-ID"},"content":{"rendered":"<p>ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be enabled, unless you&#8217;ve done some clever use of multiple identities)<\/p>\n<p>It also changes the permissions of the remote user&#8217;s home, ~\/.ssh, and ~\/.ssh\/authorized_keys to remove group writability (which would otherwise prevent you from logging in, if the remote sshd has StrictModes set in its configuration).<\/p>\n<p>If the -i option is given then the identity file (defaults to ~\/.ssh\/identity.pub) is used, regardless of whether there are any keys in your ssh-agent. Otherwise, if this:<\/p>\n<p>ssh-add -L<\/p>\n<p>provides any output, it uses that in preference to the identity file.<\/p>\n<p>If the -i option is used, or the ssh-add produced no output, then it uses the contents of the identity file. Once it has one or more fingerprints (by whatever means) it uses ssh to append them to ~\/.ssh\/authorized_keys on the remote machine (creating the file, and directory, if necessary) <\/p>\n","protected":false},"excerpt":{"rendered":"<p>ssh-copy-id is a script that uses ssh to log into a remote machine (presumably using a login password, so password authentication should be enabled, unless you&#8217;ve done some clever use of multiple identities) It also changes the permissions of the remote user&#8217;s home, ~\/.ssh, and ~\/.ssh\/authorized_keys to remove group writability (which would otherwise prevent you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[67],"tags":[15],"class_list":["post-77","post","type-post","status-publish","format-standard","hentry","category-linux","tag-ssh"],"_links":{"self":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts\/77","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/comments?post=77"}],"version-history":[{"count":1,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts\/77\/revisions"}],"predecessor-version":[{"id":78,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/posts\/77\/revisions\/78"}],"wp:attachment":[{"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/media?parent=77"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/categories?post=77"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thedarktimes.us\/wordpress\/wp-json\/wp\/v2\/tags?post=77"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}