SSH
SSH (Secure Shell) is the standard tool for remote command-line access to Linux and other systems.
You will need SSH to connect to our virtual servers and dedicated servers, including Raspberry Pi servers. You can also use SSH to connect to your hosting account if you have selected the shell access option.
SSH clients
If you are using Linux, Mac OS X, or another Unix-based system, then you can
use OpenSSH. It is likely that OpenSSH is already
installed, and available as the ssh
command in a terminal or command window.
If you are using Windows, we recommend installing PuTTY.
Authentication
SSH supports two different authentication methods:
- Password authentication
- Key-based authentication
Whilst password authentication is very straightforward, key-based authentication has a number of advantages and is generally preferred.
If you are setting up a new Mythic Beasts Raspberry Pi or Virtual Server, you will need to use key-based authentication, at least for your first login.
Password authentication
If the account you are logging into has a password configured, then you can log in using that password. If you're using OpenSSH, simply use the SSH command:
ssh <username>@<hostname>
Where hostname is the name of the server you're connecting to, and username
is the user. For a virtual or dedicated server, you will initially connect to
the root
account. For example:
ssh root@myvps.vs.mythic-beasts.com
You will be prompted for your password.
Key-based authentication
Key-based authentication uses a public/private key pair to authenticate you. The private key is stored on your computer, and the public key is stored on the server you want to connect to. Authentication happens by proving that you have the private key that corresponds to the public key lodged on the server.
To use key-based authentication you will need to generate an SSH key pair. Please see our instructions on SSH key-based authentication.
You will be asked for your public key when you provision a new server with Mythic Beasts.
Advantages
Key-based authentication has a number of advantages over password authentication:
- You can give multiple users access to the same account without sharing a password. You can easily revoke the access of an individual user.
- Adding access to a new server doesn't require sharing a sensitive password. Instead, you only need to provide your public key, which is safe to share.
- Unlike password authentication, where you must send your password to the server you're connecting to, your private key never leaves your computer.
File copying
Often you will need to copy files to or from one of our systems, for
example, when you are uploading a website to a hosting server. The
scp
command is a simple command-line file copier, modelled
after the cp
command.
You can also use sftp
or any desktop file management application that
supports the SFTP protocol.