SSH
To ensure a secure SSH connection, it is best to not rely on password authentication. Instead, we should use a key pair.
The idea is, we generate an ssh key for our machine and make our server trust it.
By doing this, we ensure that only the holder of the key can connect through SSH with the VPS, making access quicker, easily scriptable and brute-force proof.
Generate the pair
This command should prompt you for a path in which to store the keys (usually ~/.ssh/
) as well as a passphrase.
You may want to leave the passphrase blank if you plan on scripting on top of this connection. Although more convenient, it is less secure. In any case you can later run ssh-keygen -p
to change or remove the passphrase.
You will now see a key pair in the path you selected. Letâs get one of them on your server.
Get the public key on your server
Youâll have to enter your VPSâs root userâs password, after which your server will authorize access to the machine holding the SSH private key.
Log out and back in. If it bypasses the password prompt it worked! If it didnât, check the permissions for both the keys and the .ssh
directory.
Disable password logins
Not a necessary step but if you want a reason to do it just check the output of journalctl -xe
on your VPS. To avoid brute force attacks, letâs make sure logins are only allowed for the private keyholder.
Open /etc/ssh/sshd_config
in your VPS and find/set the following lines as shown.
This will harden your connection quite a bit, you can go the extra mile by setting up a non-root, sudo user and only connect to the VPS with that user. If you go that route, make sure you set PermitRootLogin no
to remove the possibility of a root login completely.
Of course, reload ssh: systemctl reload sshd
What if I lose the key?
Donât. Backups are your friends.
But in case you do, your VPS provider will likely offer some sort of local prompt emulated in a browser window.
Being local to the machine (or at least functioning as such), this will only be accessible to you after you log in to your VPS provider online account and wonât prompt you for authentication Then, simply set PasswordAuthentication yes
in /etc/ssh/sshd_config
.
Rsync
Youâll often find yourself needing to transfer files to and from your server. Rsync is probably the easiest way to do it: itâs fast, reliable and simple.
Make sure itâs installed both on your local machine and on the server, then write (or make an alias for):
This command will run recursively (including directories), transfer modification times (skips non modified files), visualize the files being uploaded, compress (z?) files for upload and Pick up where it stopped in case of lost connection.
Of course, to download something from the VPS, just reverse the arguments.
Cronjobs
There are certain routine tasks that are better left to Cron. It will take care of running any command with a given frequency or repetition pattern.
Say, for example, that you want to automate updates for your server. You could run crontab -e
and insert something like 30 2 * * 0 apt -y update && apt -y upgrade
into the file (:wq
to save and quit).
Letâs break it down:
Basically a machine friendly version of âplease update the system every Sunday at 2:30AMâ.
Thereâs plenty you can do with cronjobs, this website is a great tool to set specific patterns.
Finding Things
You might use whereis
or which
to look for executables, but that can be insufficient depending on the task at hand.
updatedb
can quickly index the whole system, which is neat since thereâs a tool called locate
that can easily find files and directories whose paths contain any given string.
So if you run updatedb
and then locate cron
, you will see a list of files and directories containing cron
in their paths. Pretty cool!
Ports
Often youâll want to know which ports are in use. Assuming ss
is installed, you could use something like:
In some cases, youâll want to free a given port no matter who is occupying it. Assuming lsof
is installed:
Keep in mind that this is a bit of a nuclear option, you might want to double-check what you are getting rid of!
Troubleshooting
Troubleshooting issues is quite common when working on a VPS, and youâll likely find the root cause in the logs.
System-wide logs can be seen by running journalctl -xe
(-xe
is to make the results a bit more useful). Of course, you can make your life easier if you know what you are after:
This will only show entries relevant to your brokenApp
.
Of course, not all apps use the system logs. These will usually have their own under /var/log/
. For example, NGINX has its access logs under /var/log/nginx/access.log
, and the error logs in /var/log/nginx/error.log
. Have a look around, youâll definitely find what youâre after.
Another useful troubleshooting utility is systemctl
. It wonât give you any logs, but you can use it to stop, restart, reload and start services manually and/or check their status:
This command will give you plenty of information regarding that specific service.