Enable SSH In Ubuntu 13.04 (Raring Ringtail) And Force Users To Use SSH Keys Without Password To Login

This brief tutorial is going to show you how to install and enable OpenSSH Server in Ubuntu 13.04 / 12.10 and older. I am also going to show you how to login via public key authentication without passwords.

The benefit of using SSH key to sign in is to protect yourself against brute-force password guessing attack. This attack consists of systematically checking all possible passwords until the correct one is found.

Since we’re going to disable password login for SSH, brute force attack will be completely unworkable in this setup.

To get started, press Ctrl – Alt – T on your keyboard to open the terminal. When it opens, run the commands below to install OpenSSH Server in Ubuntu.
sudo apt-get install openssh-server



The server is installed and by default ready to accept connections via port 22. Now that SSH server is installed on the Ubuntu server, use the client machine to create a public / private key so that both systems will use. The client will keep the private key and the server will use the client’s public key to authenticate the client.

To generate the keys, run the commands below from the client machine. The client may be a Linux machine or another OS machine like Windows or Mac with command line option to export SSH keys. After running the commands, it will prompt you to create passphrase and passwords, for the keys, don’t enter any just press Enter to skip until the keys are generated.
ssh-keygen -t rsa



Next, create a hidden .ssh folder in your home directory on the server by running the commands below. If the folder is already created, then skip below.
mkdir -p ~/.ssh

Next, run the commands below to export the client public key to the server’s ssh authorized_keys file.
cat ~/.ssh/id_rsa.pub | ssh richard@server_name ‘cat >> .ssh/authorized_keys’
replace server_name with your server name.



If everything goes as planned, you should be able to access the server without password by running the commands below.
ssh username@server_name
replace username & server_name with your own info



Now go and open ssh configuration file and make sure that only users with the private key will be allowed in. To do that, run the commands below.
sudo vi /etc/ssh/sshd_config
Than, change the line below to
PasswordAuthentication no
Restart SSH by running the commands below.
sudo /etc/init.d/ssh restart
If you run into trouble and see the error message ‘Agent admited failure to sign using the key’, run the command below on the client machine to enable managed ssh-agent.

Also, if you’re getting ‘Permission denied (publickey)’, open ssh configuration file and change the line to look like this.
ChallengeResponseAuthentication no
Public key login will only be permitted if these two lines are enable in ssh config file.

RSAAuthentication yes
PubkeyAuthentication yes
PermitRootLogin no


2 thoughts on “Enable SSH In Ubuntu 13.04 (Raring Ringtail) And Force Users To Use SSH Keys Without Password To Login”

  1. Hey, thank you very much for the review, but i still have a problem :/
    i followed your guide because i want to login to my pc with my android tablet (rooted and terminal app installed)
    i exchanged the keys but got the message ‘Permission denied (publickey), so i enabled ChallengeResponseAuthentication, but still
    when i type ‘ssh username@IP_of_my_server’ into the tablet-terminal it prompts ‘Password:’ and only when i enter the right one i get access, any suggestions?

Leave a Reply