Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Code Block
Generating public/private rsa key pair.
Enter file in which to save the key (/home/ck/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/ck/.ssh/id_rsa.
Your public key has been saved in /home/ck/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:EociK2DFhCX85+RuLAoj2pGdr/QXqbNzSiAzUwxOdV4 ck@ckii.com
The key's randomart image is:
+---[RSA 4096]----+
| .+*= o E        |
| oo=.o + .       |
|  +.o + . .      |
| . o. o+ .       |
|  = o=. S.       |
|   B +o o        |
|  o +..o .       |
|...o +B +        |
|o.ooo+=O         |
+----[SHA256]-----+

You may want pem file in some cases, and below commands can do that:

Code Block
ssh-keygen -f id_rsa -m 'PEM' -e > id_rsa.pem


Follow-up action you need to do is copying ID by ssh-copy-id <id@remote_server>

...

Note that your-keypair_root.pem should be owned by root with 400 in permission, sshfs# need to be added to the account information, and fuse.sshfs needs to be changed to fuse.


Enhance access speed with no encryption

If you want to enhance its access speed even though its security is poor than before, you can stop encryption by adding Ciphers=aes128-ctr,Compression=no like below:

For on-prem servers:

Code Block
kurapa@192.168.10.91:/ /data/synology fuse.sshfs   defaults,idmap=user,Ciphers=aes128-ctr,Compression=no,allow_other,delay_connect,reconnect,_netdev,users,umask=0002,IdentityFile=/root/.ssh/id_rsa 0 0

For AWS servers

Code Block
sshfs#centos@10.0.1.6:/pub/ /mnt/live1 fuse    user,_netdev,reconnect,uid=1000,gid=1000,idmap=user,Ciphers=aes128-ctr,Compression=no,allow_other,IdentityFile=your-keypair_root.pem  0   0


If you want to have more performance, please try NFS.