What Is SSH?
SSH, or Secure Shell, is a protocol to securely access servers. Linux-based servers are the ones that utilize it the most frequently.
The software tools allow SSH in Linux and Windows OS-based hosting. For Windows, PUTTY or KITTY software may be used to connect to the server, however, for Linux, your terminal can be used.
Being proficient with SSH is crucial for system administrators.
You will be subject to restrictions on all of your access while using shared hosting. Hosting providers will impose limits and restrictions according to their plans or agreements. And in a couple of the more affordable shared hosting options, SSH access is not available.
What are the advantages of using SSH for managing the website
- When compared to FTP, SSH is a more secure network connection.
- When compared to FTP login or Panel login, cache clearing in the server may be accomplished quickly and easily using ssh.
- Live editing is really speedy, and saving files doesn’t need downloading to a local machine.
- using the command line to manage and install apps.
Why do need SSH to maintain a server
- MySql, Apache, Java, and other services may be simply started or terminated from the server end via SSH.
- SSH may be used to control the firewall. We can utilise SSH, for instance, if we need to stop or unblock the IPS.
- checking the server end logs to find the problems.
- You may use SSH to monitor which server services are using up the most resources.
- Compared to FTP and other protocols, ssh makes it incredibly easy to remove files from the server.
How to access the SSH in shared hosting?
You must ensure that your hosting company has enabled SSH Access for your account if you want to use SSH access with shared Linux hosting. If it has already been enabled, follow the instructions below to connect to SSH using Putty.
To access SSH on Windows, you must have the putty program installed locally.
You must now use your Cpanel to produce a PPK key.
Step 1 ~ Login to cpanel >> click on the SSH.
Step 2: Following your selection of SSH Access >> Click Generate a new Key under Manage SSH Keys.
Step 3: After selecting “Generate a New Key,” input your password and then choose “Generate a Key.” keep the password safe (make sure you remember the password)
Step 4: At this point, you must input a password, create a key, and save the password in a notepad of your choosing.
Step 5: After the key has been produced, click “GO Back” to view it. Then, select “Manage” as shown on the page below.
Step 6: Authorize the key you generated by clicking the Authorize button.
Step 7 ~ Now you need to download the Private key.
Step 8: Type the password you created when you generated the key, then click Convert.
Step 9: At this point, you can download and store the file locally.
Step 10: Open Putty enter the Server IP and add the RSA key in the putty as mentioned in the screen.(category >> SSH >> auth)
Step 11: Click on open after you upload the file you downloaded, then input your server’s IP address and port 22. Finally, choose SSH, and click on open to connect to SSH.
You may connect to SSH by following the procedures above.
Login Issues in SSH
There may be a problem with the SSH logins when a domain name is changed from one server to another. The majority of the warning dialogues that most SSH apps display resemble those below:
WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
To speak with your system administrator, please.
To remove this message, modify the host key in /home/user/.ssh/known hosts.
Offending key in known hosts in /home/user/.ssh:4
You have asked for stringent checking since domain.com’s RSA host key has changed.
Verification of the host key failed.
This notice, which is printed by the SSH programme more frequently, forbids the user from connecting to the dubious website. When the website switches servers, this issue arises because the new servers’ RSA key is sent when the authentication is different from that of the previous servers.
You can be pretty certain that the RSA key change during a migration was not a mistake, but in order to connect to the new server, you must delete the line in.ssh/known hosts that corresponds to the domain name. If the system has Perl installed, you may use this one-liner instead of manually updating the “known hosts” file:
perl -p -i -e ‘s/^example.com.*n//;’ ~/.ssh/known_hosts
Now you must replace example.com with the actual domain, always making sure to place the backslash before the dot. You must repeat this process for each domain if there are several that have transferred.
How to use SSH in Linux?
A command-line ssh client is present in every contemporary Unix-like system, including Linux, OS X, BSDs, and others.
Go to a command line and enter the following to log into your computer from a Unix-like machine: ssh username>@computer name or IP address>.
As an illustration, use ssh firstname.lastname@example.org or ssh email@example.com.
If passwords are disabled, you should see the standard password prompt (or a message stating that you cannot log in).
If you wish to authenticate using keys rather than passwords, see ssh keys.
If you are facing any issues or If you need any assistance, feel free to contact our technical team members as they are available 24/7 via phone call.