Gice

Technology and General Blog

I was requested how to transfer information using scp without having a password making use of a pem file for authentication. Soon after reading through this tutorial, you’ll know how to produce an SSH key and transform it to a pem file to down load or add data files utilizing the scp command.

If you by now have your .pem important, you can bounce to the Employing scp with pem part.

Produce a pem vital for scp:

To start off, let’s produce the ssh key pair by running the command below.

Execute the adhering to command to make the .pem file.

ssh-keygen -f ~/.ssh/id_rsa -e -m pem

After created the critical pair, duplicate the community critical to the server you want to hook up to working with a pem file for authentication by operating the command down below. Switch the username “kali” with your username and the IP handle with your server IP.

ssh-copy-id kali@192.168.1.100

Just after jogging the command higher than, a file named pk_dsa.pem should be made in your residence .ssh directory.

Now you are completely ready to down load and upload documents with scp working with a pem file.

Add file or directory using scp with pem:

To use the scp command with a key pair, you need to implement the -i (Determine file) flag.

In the to start with example, I demonstrate how to upload a file named linuxhintsignal to the server 192.168.1.100.

As you can see in the impression beneath, the scp command is adopted by the -i flag and the pem file named pk_dsa.pem. Then the file to mail is specified, adopted by the remote username and server. The closing colon just after the IP defines the default route, which is the kali user household as the destination directory.

scp -i pk_dsa.pem linuxhintsignal kali@192.168.1.100:

As you can see, the file was uploaded effectively within the remote user’s residence directory (kali).

The next illustration displays how to add a listing (named listing) to the subdirectory named dir, positioned in the distant home of the consumer kali.

As you can see, to upload directories recursively, you need to include the -r flag.

Notice: I received an mistake I solved when making an attempt to capture this case in point by specifying the .pem path (.ssh/pk_dsa.pem) as revealed in the illustration under.

scp -r -i .ssh/pk_dsa.pem listing kali@192.168.1.112:dir

The directory is now under the target’s dir subdirectory.

Obtain file or directory using scp with pem:

In the prior case in point, the destination listing was defined at the close of the command. The location listing ought to also be defined at the conclude of the command when downloading documents, as proven in the following case in point. This is for the reason that scp was built to be equivalent as possible to the common cp command.

In the subsequent instance, the file linuxhintsignal is downloaded to the area /tmp directory defined at the command’s close.

scp -i pk_dsa.pem kali@192.168.1.112:linuxhintsignal /tmp

Downloading a listing recursively also requires the -r flag. The dir distant directory is downloaded to the latest area listing, defined with a dot in the next instance.

scp -r -i pk_dsa.pem kali@192.168.1.112:dir .

As you can see, the directory transference was performed recursively.

Conclusion:

As you can see, utilizing scp with a pem file is basic and just demands including the -i flag.

Community key authentication has pros and downsides when as opposed to password authentication.

In the very first spot, produced community keys are more robust than human passwords. Opposite to password authentication, when employing a general public crucial, your non-public vital is not shipped to the server (the server sends the public vital to the consumer), so it is not vulnerable for Male In the Center assaults.

Lots of administrators pick password authentication due to the fact it is easy to share when when compared to critical pairs.

Thank you for examining this tutorial outlining how to use scp with a pem file I hope it was useful. Continue to keep following us for far more Linux suggestions and tutorials.

Leave a Reply

Your email address will not be published. Required fields are marked *