...
Code Block |
---|
Generating public/private rsa key pair. Enter file in which to save the key (/home/ck/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/ck/.ssh/id_rsa. Your public key has been saved in /home/ck/.ssh/id_rsa.pub. The key fingerprint is: SHA256:EociK2DFhCX85+RuLAoj2pGdr/QXqbNzSiAzUwxOdV4 ck@ckii.com The key's randomart image is: +---[RSA 4096]----+ | .+*= o E | | oo=.o + . | | +.o + . . | | . o. o+ . | | = o=. S. | | B +o o | | o +..o . | |...o +B + | |o.ooo+=O | +----[SHA256]-----+ |
You may want pem file in some cases, and below commands can do that:
Code Block |
---|
ssh-keygen -f id_rsa -m 'PEM' -e > id_rsa.pem |
Follow-up action you need to do is copying ID by ssh-copy-id <id@remote_server>
...
Note that your-keypair_root.pem should be owned by root with 400 in permission, sshfs# need to be added to the account information, and fuse.sshfs needs to be changed to fuse.
Enhance access speed with no encryption
If you want to enhance its access speed even though its security is poor than before, you can stop encryption by adding Ciphers=aes128-ctr,Compression=no like below:
For on-prem servers:
Code Block |
---|
kurapa@192.168.10.91:/ /data/synology fuse.sshfs defaults,idmap=user,Ciphers=aes128-ctr,Compression=no,allow_other,delay_connect,reconnect,_netdev,users,umask=0002,IdentityFile=/root/.ssh/id_rsa 0 0 |
For AWS servers
Code Block |
---|
sshfs#centos@10.0.1.6:/pub/ /mnt/live1 fuse user,_netdev,reconnect,uid=1000,gid=1000,idmap=user,Ciphers=aes128-ctr,Compression=no,allow_other,IdentityFile=your-keypair_root.pem 0 0 |
If you want to have more performance, please try NFS.