<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.amahi.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Crxtasy12</id>
	<title>Amahi Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.amahi.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Crxtasy12"/>
	<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php/Special:Contributions/Crxtasy12"/>
	<updated>2026-04-11T08:56:59Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.34.2</generator>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=PhpSysInfo&amp;diff=41707</id>
		<title>PhpSysInfo</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=PhpSysInfo&amp;diff=41707"/>
		<updated>2011-06-06T05:18:43Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: show log in as root&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Apps]]&lt;br /&gt;
== Getting More Info ==&lt;br /&gt;
After the one click install of phpsysinfo in Amahi 6.0, you need to do some modifications to get all system information displayed.&lt;br /&gt;
&lt;br /&gt;
open a terminal session and login as root or if you have sudo configured use sudo in front of all commands. &lt;br /&gt;
&lt;br /&gt;
type&lt;br /&gt;
{{Code| su -}}&lt;br /&gt;
at the prompt enter your root password&lt;br /&gt;
&lt;br /&gt;
then type&lt;br /&gt;
{{Code|yum install lm_sensors&lt;br /&gt;
sensors-detect}}&lt;br /&gt;
&lt;br /&gt;
keep pressing enter for default answers.&lt;br /&gt;
&lt;br /&gt;
{{Code|cd /var/hda/web-apps/phpsysinfo/html&lt;br /&gt;
cp config.php config.php_bak}}&lt;br /&gt;
 &lt;br /&gt;
to make a backup of your original config file&lt;br /&gt;
&lt;br /&gt;
{{Code|nano config.php}}&lt;br /&gt;
&lt;br /&gt;
Change define('PSI_SENSOR_PROGRAM', ''); to define('PSI_SENSOR_PROGRAM', 'LMsensors'); This tells phpsysinfo to use lm_sensors to obtain and display sensor information.&lt;br /&gt;
&lt;br /&gt;
Other optional changes:&lt;br /&gt;
 define('PSI_HIDE_MOUNTS', '/boot,/dev/shm'); - hides /boot and /dev/shm in mounted filesystems&lt;br /&gt;
 define('PSI_HIDE_FS_TYPES', 'tmpfs'); -  hides tmpfs filesystems&lt;br /&gt;
 define('PSI_HDD_TEMP', 'tcp'); - tells PSI to obtain current hdd temp &lt;br /&gt;
 define('PSI_LOAD_BAR', true); &lt;br /&gt;
 define('PSI_UPS_PROGRAM', 'Apcupsd'); -  use apcupsd to show APC info from APC UPS's&lt;br /&gt;
 &lt;br /&gt;
after saving config.php phpsysinfo will provide voltage, fan and temperature data.&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=PhpSysInfo&amp;diff=41701</id>
		<title>PhpSysInfo</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=PhpSysInfo&amp;diff=41701"/>
		<updated>2011-06-06T05:12:21Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: Updated page for Amahi 6 and PSI 3.11&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Apps]]&lt;br /&gt;
== Getting More Info ==&lt;br /&gt;
After the one click install of phpsysinfo in Amahi 6.0, I needed to do some modifications to get all system information displayed.&lt;br /&gt;
For other users, this is what I did.&lt;br /&gt;
&lt;br /&gt;
first open a terminal session and login as root&lt;br /&gt;
from another computer&lt;br /&gt;
in windows with putty&lt;br /&gt;
or in linux: ssh root@hda&lt;br /&gt;
&lt;br /&gt;
type&lt;br /&gt;
&lt;br /&gt;
{{Code|yum install lm_sensors&lt;br /&gt;
sensors-detect}}&lt;br /&gt;
&lt;br /&gt;
keep pressing enter for default answers.&lt;br /&gt;
&lt;br /&gt;
{{Code|cd /var/hda/web-apps/phpsysinfo/html&lt;br /&gt;
cp config.php config.php_bak}}&lt;br /&gt;
 &lt;br /&gt;
to make a backup of your original config file&lt;br /&gt;
&lt;br /&gt;
{{Code|nano config.php}}&lt;br /&gt;
&lt;br /&gt;
Change define('PSI_SENSOR_PROGRAM', ''); to define('PSI_SENSOR_PROGRAM', 'LMsensors'); This tells phpsysinfo to use lm_sensors to obtain and display sensor information.&lt;br /&gt;
&lt;br /&gt;
Other optional changes:&lt;br /&gt;
 define('PSI_HIDE_MOUNTS', '/boot,/dev/shm'); - hides /boot and /dev/shm in mounted filesystems&lt;br /&gt;
 define('PSI_HIDE_FS_TYPES', 'tmpfs'); -  hides tmpfs filesystems&lt;br /&gt;
 define('PSI_HDD_TEMP', 'tcp'); - tells PSI to obtain current hdd temp &lt;br /&gt;
 define('PSI_LOAD_BAR', true); &lt;br /&gt;
 define('PSI_UPS_PROGRAM', 'Apcupsd'); -  use apcupsd to show APC info from APC UPS's&lt;br /&gt;
 &lt;br /&gt;
after saving config.php phpsysinfo will provide voltage, fan and temperature data.&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=35587</id>
		<title>Key-Based SSH Logins</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=35587"/>
		<updated>2011-03-01T02:44:08Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: Changed /etc/sshd to /etc/ssh&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page shows how to create a key based SSH login to your server using the Windows PuTTY client, Mac OS X Terminal.app or Linux.'''&lt;br /&gt;
&lt;br /&gt;
This will allow you to safely login using SSH onto your HDA without having to provide a password every time.&lt;br /&gt;
&lt;br /&gt;
=Windows - PuTTY=&lt;br /&gt;
&lt;br /&gt;
==Install Putty and PuttyGen==&lt;br /&gt;
Download the following files from the [http://www.chiark.greenend.org.uk/%7Esgtatham/putty/download.html PuTTY download] page and save them on your Windows system, e.g. on the desktop:&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe]&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe]&lt;br /&gt;
&lt;br /&gt;
Both files are self contained executables. That is: they do not install anything but run from where they are saved.&lt;br /&gt;
&lt;br /&gt;
==Create a profile for use with your Amahi HDA==&lt;br /&gt;
In PuTTY, you can create profiles for connections to your various SSH servers, so you don't have to type in the settings again when you want to connect to a certain server again.&lt;br /&gt;
&lt;br /&gt;
Now we will create a profile for our 192.168.1.67 server. Start PuTTY by double-clicking its executable file. You are now in the category Session (see the tree on the left side of the screenshot). Enter 192.168.1.67 under Host Name (or IP address), enter 22 under Port and select SSH under Protocol. &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Now select '''Connection &amp;gt;&amp;gt; Data'' in the Category box and in the Auto-login box enter the username you wish to login to your HDA with. In this example 'sue'.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S02.png]]&lt;br /&gt;
&lt;br /&gt;
Once this is done return to your Sessions and give your profile a meaningful name and press save. Anytime in the future you can click on your profile name a ''Open'' and your session is opened. You will appreciate this more later.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connecting to your HDA using SSH==&lt;br /&gt;
&lt;br /&gt;
Now you are on your 'Sessions' screen lets open our session by pressing open. You should see:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S03.png]]&lt;br /&gt;
&lt;br /&gt;
Type in the users password and you have your ssh xterm ready to go. Now this was the normal way of logging in but being a password system it is open to brute force attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
&lt;br /&gt;
Here we can use PuTTYgen to create a private/public key pair. Start it by double-clicking its executable file. Make sure you select SSH-2 RSA under Type of key to generate and specify 1024 as the Number of bits in a generated key. Then click on Generate: &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S04.png]]&lt;br /&gt;
&lt;br /&gt;
Move your mouse about randomly to generate the randomness.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05.png]]&lt;br /&gt;
&lt;br /&gt;
Now a private/public key pair has been generated. Under Key comment, you can enter any comment; normally you use your email address here. Then specify a Key passphrase and repeat it under Confirm passphrase. You'll need that passphrase to log in to SSH with your new key. Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05a.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S06.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save private key. You can save it in the same location as the public key - it should be a location that only you can access and that you don't lose! (If you lose the keys and have disabled username/password logins, then you can't log in anymore!) Again, you're free to choose a filename, but this time the extension must be '''''.ppk''''': &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S07.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server. Copy the key from the PuttyGEN window:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S08.png]]&lt;br /&gt;
&lt;br /&gt;
Using ''putty'' logon to our Amahi HDA using the profile you created earlier.&lt;br /&gt;
&lt;br /&gt;
We must now create a directory and file in which to store our public key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And open our file that will store our key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;vi ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
Type '''''I''''' to enter insert mode. Paste your copied key (just a right click of the mouse was enough for me. Then '''''&amp;lt;Escape&amp;gt; :wq''''' to exit edit mode, write the file and quit. This file may already exist if you have used ssh before.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S09.png]]&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Configure PuTTY to use the private key==&lt;br /&gt;
&lt;br /&gt;
Close down your shell to your HDA and restart ''putty'' and load your ''192.168.1.67'' profile&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Go to '''''SSH &amp;gt;&amp;gt; Auth''''' and click on '''''Browse'''''&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S10.png]]&lt;br /&gt;
&lt;br /&gt;
Browse to the folder where you saved your keys and select the private key. The one with the '''''ppk''''' suffix.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S11.png]]&lt;br /&gt;
&lt;br /&gt;
Go back to your Session tab and click save.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Our private key is now attached to our profile&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Our key-based logon==&lt;br /&gt;
&lt;br /&gt;
Now on our PuTTY  sessions screen load your '''192.168.1.67''' profile and press ''Open''. You should get:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12.png]]&lt;br /&gt;
&lt;br /&gt;
Enter your passphrase that you created when generating your keys.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12a.png]]&lt;br /&gt;
&lt;br /&gt;
=Mac OS X - Terminal.app=&lt;br /&gt;
&lt;br /&gt;
==Open Terminal.app==&lt;br /&gt;
You can find Terminal.app in your Applications &amp;gt; Utilities folder.&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Accept all the defaults values (by hitting ENTER) to the questions you'll be asked.&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server.&lt;br /&gt;
&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
scp ~/.ssh/id_rsa.pub your_username@hda:.&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace ''your_username'' with the username you created on Fedora.&amp;lt;br/&amp;gt;&lt;br /&gt;
If your HDA is not yet setup, you might have to replace ''hda'' by your HDA' IP address too.&amp;lt;br/&amp;gt;&lt;br /&gt;
When prompted, enter the associated password.&lt;br /&gt;
&lt;br /&gt;
Then, we must copy that public key into the ''authorized_keys'' file.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;ssh your_username@hda&amp;lt;br /&amp;gt;&lt;br /&gt;
mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
mv id_rsa.pub .ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Linux=&lt;br /&gt;
&lt;br /&gt;
Follow the [[#Mac_OS_X_-_Terminal.app|Mac OS X instructions]], but use a standard terminal (Applications &amp;gt; System Tools &amp;gt; Terminal in Fedora).&lt;br /&gt;
&lt;br /&gt;
=Making it that tad more secure=&lt;br /&gt;
&lt;br /&gt;
Up to now, you can log in with your private/public key pair and still with username/password logins, so if someone doesn't attach a private key to his PuTTY session, he will be asked for a username and password. So to achieve a better security, we must disable the username/password logins (you should do this only when you know that your key-based logins are working, because if they aren't and you disable username/password logins, then you have a problem...).&lt;br /&gt;
&lt;br /&gt;
To disable the username/password logins, we must modify the sshd configuration file. On our Fedora based Amahi system, it's /etc/ssh/sshd_config. You should set Protocol to 2 (1 is insecure and should not be used!), PasswordAuthentication to no.&lt;br /&gt;
&lt;br /&gt;
Login as root:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;su -&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 vi /etc/ssh/sshd_config&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S13.png]]&lt;br /&gt;
&lt;br /&gt;
You will now need to restart you SSH server&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
 service sshd restart&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=Fedora_14&amp;diff=31243</id>
		<title>Fedora 14</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=Fedora_14&amp;diff=31243"/>
		<updated>2011-01-21T23:13:08Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: Fixed misspelling&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:F14release.png]]&amp;lt;br /&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;'''ETA''': End of Jan 2011, plus/minus a few weeks for release of Amahi for Fedora 14. We are in still in the [http://forums.amahi.org/viewtopic.php?f=34&amp;amp;t=1975 development/testing] phase.  &lt;br /&gt;
&lt;br /&gt;
'''WARNING:'''  There are '''NO''' applications publicly available in Amahi for Fedora 14 at this time.&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Development Notes =&lt;br /&gt;
'''DISCLAIMER:'''  These notes are for development of Amahi with Fedora 14.  These notes are not by any means anything for users to follow.  Please continue to install Fedora 12 for new Amahi installs.  Fedora 14 is not '''OFFICIALLY''' supported yet by Amahi.&lt;br /&gt;
&lt;br /&gt;
The following '''ARE NOT''' Amahi ready with Fedora 14 at this time:&lt;br /&gt;
* ExpressCD:  estimate late Feb 2011&lt;br /&gt;
* Plug:  depends on Fedora 14 ARM release&lt;br /&gt;
&lt;br /&gt;
== Fedora 14 DVD Downloads ==&lt;br /&gt;
{|&lt;br /&gt;
|+&lt;br /&gt;
|-&lt;br /&gt;
| 32-Bit (3.4GB):  &lt;br /&gt;
|[http://download.fedoraproject.org/pub/fedora/linux/releases/14/Fedora/i386/iso/Fedora-14-i386-DVD.iso Http]&lt;br /&gt;
|[http://torrent.fedoraproject.org/torrents/Fedora-14-i386-DVD.torrent Torrent]&lt;br /&gt;
|-&lt;br /&gt;
| 64-Bit (3.3GB):  &lt;br /&gt;
|[http://download.fedoraproject.org/pub/fedora/linux/releases/14/Fedora/x86_64/iso/Fedora-14-x86_64-DVD.iso Http]&lt;br /&gt;
|[http://torrent.fedoraproject.org/torrents/Fedora-14-x86_64-DVD.torrent Torrent]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Amahi Repo ==&lt;br /&gt;
* 32-bit and 64-bit is ready.&lt;br /&gt;
* Use '''&amp;lt;nowiki&amp;gt;http://f14.amahi.org&amp;lt;/nowiki&amp;gt;''' for install.&lt;br /&gt;
* App store is not complete yet - there are '''NO''' apps publicly available.&lt;br /&gt;
&lt;br /&gt;
== Amahi Install ==&lt;br /&gt;
* Web installer works.&lt;br /&gt;
&amp;lt;!--, but need to update hdactl and restart installer:&lt;br /&gt;
 yum install hdactl --nodeps&lt;br /&gt;
 service amahi-installer restart--&amp;gt;&lt;br /&gt;
* Open browser and navigate to '''&amp;lt;nowiki&amp;gt;http://localhost:2000&amp;lt;/nowiki&amp;gt;''' &lt;br /&gt;
* Enter install code&lt;br /&gt;
&lt;br /&gt;
== Known Issues ==&lt;br /&gt;
* Fedora creates small root (/) and large home (/home) partition. See [[Install_without_LVM|Install without LVM]] to change.&lt;br /&gt;
* [http://www.amahi.org/support/instructions Installation instructions] are not updated for Fedora 14.&lt;br /&gt;
# Ensure '''Graphical Desktop''' is checked.&lt;br /&gt;
&amp;lt;!--# Enable '''Fedora i386''' (32-bit) or '''Fedora x86_64''' (64-bit) repo (this is will be removed once the Amahi repo is aligned).--&amp;gt;&lt;br /&gt;
# Add '''Amahi''' repo as noted above.&lt;br /&gt;
# Then continue with install as documented.&lt;br /&gt;
&amp;lt;!--# After installation, as '''root''' user (once added to amahi repo, this will be no longer required):&lt;br /&gt;
 rpm -Uvh http://alpha.amahi.org/tmp/hda-platform-5.6.11-1.noarch.rpm --&amp;gt;&lt;br /&gt;
* There is a problem with setting the timezone in PHP.  A workaround is in place to allow the install process to continue.  This will affect some apps.&lt;br /&gt;
&lt;br /&gt;
== Application Testing ==&lt;br /&gt;
===Working Apps:  NOT publicly available yet in Amahi for Fedora 14===&lt;br /&gt;
{| style=&amp;quot;color:black; background-color:#ffffcc;&amp;quot; cellpadding=&amp;quot;10&amp;quot; cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
|- &lt;br /&gt;
| phpRecipeBook&lt;br /&gt;
| WebCalendar&lt;br /&gt;
| eyeOS&lt;br /&gt;
| Transmission&lt;br /&gt;
| phpYahtzee&lt;br /&gt;
|- &lt;br /&gt;
| php Address Book&lt;br /&gt;
| Home Inventory&lt;br /&gt;
| MindTerm&lt;br /&gt;
| Gallery 3&lt;br /&gt;
| LogAnalyzer&lt;br /&gt;
|-&lt;br /&gt;
| Webmin&lt;br /&gt;
| RPM Fusion (Non-Free)&lt;br /&gt;
| RPM Fusion (Free)&lt;br /&gt;
| Scientific Calculator&lt;br /&gt;
| Sheeva Theme&lt;br /&gt;
|-&lt;br /&gt;
| phpMyAdmin&lt;br /&gt;
| webERP&lt;br /&gt;
| Family Connections&lt;br /&gt;
| Torrentflux b4rt&lt;br /&gt;
| Drupal&lt;br /&gt;
|-&lt;br /&gt;
| Rnews&lt;br /&gt;
| Gregarius&lt;br /&gt;
| iCalendar&lt;br /&gt;
| Wordpress&lt;br /&gt;
| Clipperz&lt;br /&gt;
|-&lt;br /&gt;
| MediaWiki&lt;br /&gt;
| osTicket&lt;br /&gt;
| ArcademSX&lt;br /&gt;
| ArcademSX Game Pack 1&lt;br /&gt;
| ArcademSX Game Pack 2&lt;br /&gt;
|-&lt;br /&gt;
| eXtplorer&lt;br /&gt;
| PHP Navigator&lt;br /&gt;
| phpMan&lt;br /&gt;
| Adminer&lt;br /&gt;
| Fantasy Football League&lt;br /&gt;
|-&lt;br /&gt;
| openSIS&lt;br /&gt;
| clearBudget&lt;br /&gt;
| DokuWiki&lt;br /&gt;
| WikkaWiki&lt;br /&gt;
| TheAddressBook&lt;br /&gt;
|-&lt;br /&gt;
| vTiger&lt;br /&gt;
| phplist&lt;br /&gt;
| LinPHA&lt;br /&gt;
| phpMyBackup&lt;br /&gt;
| portaNEO&lt;br /&gt;
|-&lt;br /&gt;
| Joomla&lt;br /&gt;
| Gallery 2&lt;br /&gt;
| Piwik&lt;br /&gt;
| Blog&lt;br /&gt;
| Jinzora&lt;br /&gt;
|-&lt;br /&gt;
| Torrentflux&lt;br /&gt;
| vnStat&lt;br /&gt;
| Ampache&lt;br /&gt;
| Maps&lt;br /&gt;
| VCD-db&lt;br /&gt;
|-&lt;br /&gt;
| Speedtest.net Mini&lt;br /&gt;
| MyPhpMoney&lt;br /&gt;
| Redmine *&lt;br /&gt;
| Tiny Tiny RSS&lt;br /&gt;
| Feng Office&lt;br /&gt;
|-&lt;br /&gt;
| phpSysInfo&lt;br /&gt;
| OpenVPN ALS&lt;br /&gt;
| Web KeePass&lt;br /&gt;
| AjaXplorer&lt;br /&gt;
| WebChess&lt;br /&gt;
|-&lt;br /&gt;
| CrashPlan&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''NOTE:'''  &amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; denotes BETA application.&lt;br /&gt;
&lt;br /&gt;
=== Broken Apps:  NOT publicly available yet in Amahi for Fedora 14 ===&lt;br /&gt;
* phpBB:  Works, but has [phpBB Debug] PHP Notice: in file /index.php on line 86: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected 'America/Chicago' for 'CDT/-5.0/DST' instead&lt;br /&gt;
* Mantis:  Works, but has SYSTEM WARNING: date_default_timezone_get(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected 'America/Chicago' for 'CDT/-5.0/DST' instead&lt;br /&gt;
* ajaxterm:  Installed, but but says 'Service Termporarily Unavailable'&lt;br /&gt;
* Horde:  Installed, but does not work.  Login screen missing Login options.&lt;br /&gt;
* CoolSmile:  Installed, but does not work.&lt;br /&gt;
* SABnzbd:  Installed and works, but unrar does not install.  RPMFusion public keys not available.&lt;br /&gt;
* DLNA: Does not install. It gets stuck at &amp;quot;Preparing to install...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
====Last Update====&lt;br /&gt;
'''Current As of Jan 19, 2011/4:00 PM CST'''&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=29905</id>
		<title>Key-Based SSH Logins</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=29905"/>
		<updated>2011-01-15T19:55:24Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: Fixed more typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page shows how to create a key based SSH login to your server using the Windows PuTTY client, Mac OS X Terminal.app or Linux.'''&lt;br /&gt;
&lt;br /&gt;
This will allow you to safely login using SSH onto your HDA without having to provide a password every time.&lt;br /&gt;
&lt;br /&gt;
=Windows - PuTTY=&lt;br /&gt;
&lt;br /&gt;
==Install Putty and PuttyGen==&lt;br /&gt;
Download the following files from the [http://www.chiark.greenend.org.uk/%7Esgtatham/putty/download.html PuTTY download] page and save them on your Windows system, e.g. on the desktop:&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe]&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe]&lt;br /&gt;
&lt;br /&gt;
Both files are self contained executables. That is: they do not install anything but run from where they are saved.&lt;br /&gt;
&lt;br /&gt;
==Create a profile for use with your Amahi HDA==&lt;br /&gt;
In PuTTY, you can create profiles for connections to your various SSH servers, so you don't have to type in the settings again when you want to connect to a certain server again.&lt;br /&gt;
&lt;br /&gt;
Now we will create a profile for our 192.168.1.67 server. Start PuTTY by double-clicking its executable file. You are now in the category Session (see the tree on the left side of the screenshot). Enter 192.168.1.67 under Host Name (or IP address), enter 22 under Port and select SSH under Protocol. &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Now select '''Connection &amp;gt;&amp;gt; Data'' in the Category box and in the Auto-login box enter the username you wish to login to your HDA with. In this example 'sue'.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S02.png]]&lt;br /&gt;
&lt;br /&gt;
Once this is done return to your Sessions and give your profile a meaningful name and press save. Anytime in the future you can click on your profile name a ''Open'' and your session is opened. You will appreciate this more later.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connecting to your HDA using SSH==&lt;br /&gt;
&lt;br /&gt;
Now you are on your 'Sessions' screen lets open our session by pressing open. You should see:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S03.png]]&lt;br /&gt;
&lt;br /&gt;
Type in the users password and you have your ssh xterm ready to go. Now this was the normal way of logging in but being a password system it is open to brute force attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
&lt;br /&gt;
Here we can use PuTTYgen to create a private/public key pair. Start it by double-clicking its executable file. Make sure you select SSH-2 RSA under Type of key to generate and specify 1024 as the Number of bits in a generated key. Then click on Generate: &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S04.png]]&lt;br /&gt;
&lt;br /&gt;
Move your mouse about randomly to generate the randomness.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05.png]]&lt;br /&gt;
&lt;br /&gt;
Now a private/public key pair has been generated. Under Key comment, you can enter any comment; normally you use your email address here. Then specify a Key passphrase and repeat it under Confirm passphrase. You'll need that passphrase to log in to SSH with your new key. Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05a.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S06.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save private key. You can save it in the same location as the public key - it should be a location that only you can access and that you don't lose! (If you lose the keys and have disabled username/password logins, then you can't log in anymore!) Again, you're free to choose a filename, but this time the extension must be '''''.ppk''''': &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S07.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server. Copy the key from the PuttyGEN window:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S08.png]]&lt;br /&gt;
&lt;br /&gt;
Using ''putty'' logon to our Amahi HDA using the profile you created earlier.&lt;br /&gt;
&lt;br /&gt;
We must now create a directory and file in which to store our public key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And open our file that will store our key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;vi ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
Type '''''I''''' to enter insert mode. Paste your copied key (just a right click of the mouse was enough for me. Then '''''&amp;lt;Escape&amp;gt; :wq''''' to exit edit mode, write the file and quit. This file may already exist if you have used ssh before.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S09.png]]&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Configure PuTTY to use the private key==&lt;br /&gt;
&lt;br /&gt;
Close down your shell to your HDA and restart ''putty'' and load your ''192.168.1.67'' profile&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Go to '''''SSH &amp;gt;&amp;gt; Auth''''' and click on '''''Browse'''''&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S10.png]]&lt;br /&gt;
&lt;br /&gt;
Browse to the folder where you saved your keys and select the private key. The one with the '''''ppk''''' suffix.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S11.png]]&lt;br /&gt;
&lt;br /&gt;
Go back to your Session tab and click save.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Our private key is now attached to our profile&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Our key-based logon==&lt;br /&gt;
&lt;br /&gt;
Now on our PuTTY  sessions screen load your '''192.168.1.67''' profile and press ''Open''. You should get:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12.png]]&lt;br /&gt;
&lt;br /&gt;
Enter your passphrase that you created when generating your keys.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12a.png]]&lt;br /&gt;
&lt;br /&gt;
=Mac OS X - Terminal.app=&lt;br /&gt;
&lt;br /&gt;
==Open Terminal.app==&lt;br /&gt;
You can find Terminal.app in your Applications &amp;gt; Utilities folder.&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Accept all the defaults values (by hitting ENTER) to the questions you'll be asked.&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server.&lt;br /&gt;
&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
scp ~/.ssh/id_rsa.pub your_username@hda:.&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace ''your_username'' with the username you created on Fedora.&amp;lt;br/&amp;gt;&lt;br /&gt;
If your HDA is not yet setup, you might have to replace ''hda'' by your HDA' IP address too.&amp;lt;br/&amp;gt;&lt;br /&gt;
When prompted, enter the associated password.&lt;br /&gt;
&lt;br /&gt;
Then, we must copy that public key into the ''authorized_keys'' file.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;ssh your_username@hda&amp;lt;br /&amp;gt;&lt;br /&gt;
mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
mv id_rsa.pub .ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Linux=&lt;br /&gt;
&lt;br /&gt;
Follow the [[#Mac_OS_X_-_Terminal.app|Mac OS X instructions]], but use a standard terminal (Applications &amp;gt; System Tools &amp;gt; Terminal in Fedora).&lt;br /&gt;
&lt;br /&gt;
=Making it that tad more secure=&lt;br /&gt;
&lt;br /&gt;
Up to now, you can log in with your private/public key pair and still with username/password logins, so if someone doesn't attach a private key to his PuTTY session, he will be asked for a username and password. So to achieve a better security, we must disable the username/password logins (you should do this only when you know that your key-based logins are working, because if they aren't and you disable username/password logins, then you have a problem...).&lt;br /&gt;
&lt;br /&gt;
To disable the username/password logins, we must modify the sshd configuration file. On our Fedora based Amahi system, it's /etc/ssh/sshd_config. You should set Protocol to 2 (1 is insecure and should not be used!), PasswordAuthentication to no.&lt;br /&gt;
&lt;br /&gt;
Login as root:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;su -&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sshd/sshd_config&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S13.png]]&lt;br /&gt;
&lt;br /&gt;
You will now need to restart you SSH server&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
 service sshd restart&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=29899</id>
		<title>Key-Based SSH Logins</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=29899"/>
		<updated>2011-01-15T19:52:11Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: Fixed typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page shows how to create a key based SSH login to your server using the Windows PuTTY client, Mac OS X Terminal.app or Linux.'''&lt;br /&gt;
&lt;br /&gt;
This will allow you to safely login using SSH onto your HDA without having to provide a password every time.&lt;br /&gt;
&lt;br /&gt;
=Windows - PuTTY=&lt;br /&gt;
&lt;br /&gt;
==Install Putty and PuttyGen==&lt;br /&gt;
Download the following files from the [http://www.chiark.greenend.org.uk/%7Esgtatham/putty/download.html PuTTY download] page and save them on your Windows system, e.g. on the desktop:&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe]&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe]&lt;br /&gt;
&lt;br /&gt;
Both files are self contained executables. That is: they do not install anything but run from where they are saved.&lt;br /&gt;
&lt;br /&gt;
==Create a profile for use with your Amahi HDA==&lt;br /&gt;
In PuTTY, you can create profiles for connections to your various SSH servers, so you don't have to type in the settings again when you want to connect to a certain server again.&lt;br /&gt;
&lt;br /&gt;
Now we will create a profile for our 192.168.1.67 server. Start PuTTY by double-clicking its executable file. You are now in the category Session (see the tree on the left side of the screenshot). Enter 192.168.1.67 under Host Name (or IP address), enter 22 under Port and select SSH under Protocol. &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Now select '''Connection &amp;gt;&amp;gt; Data'' in the Category box and in the Auto-login box enter the username you wish to login to your HDA with. In this example 'sue'.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S02.png]]&lt;br /&gt;
&lt;br /&gt;
Once this is done return to your Sessions and give your profile a meaningful name and press save. Anytime in the future you can click on your profile name a ''Open'' and your session is opened. You will appreciate this more later.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connecting to your HDA using SSH==&lt;br /&gt;
&lt;br /&gt;
Now you are on your 'Sessions' screen lets open our session by pressing open. You should see:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S03.png]]&lt;br /&gt;
&lt;br /&gt;
Type in the users password and you have your ssh xterm ready to go. Now this was the normal way of logging in but being a password system it is open to brute force attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
&lt;br /&gt;
Here we can use PuTTYgen to create a private/public key pair. Start it by double-clicking its executable file. Make sure you select SSH-2 RSA under Type of key to generate and specify 1024 as the Number of bits in a generated key. Then click on Generate: &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S04.png]]&lt;br /&gt;
&lt;br /&gt;
Move your mouse about randomly to generate the randomness.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05.png]]&lt;br /&gt;
&lt;br /&gt;
Now a private/public key pair has been generated. Under Key comment, you can enter any comment; normally you use your email address here. Then specify a Key passphrase and repeat it under Confirm passphrase. You'll need that passphrase to log in to SSH with your new key. Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05a.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S06.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save private key. You can save it in the same location as the public key - it should be a location that only you can access and that you don't lose! (If you lose the keys and have disabled username/password logins, then you can't log in anymore!) Again, you're free to choose a filename, but this time the extension must be '''''.ppk''''': &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S07.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server. Copy the key from the PuttyGEN window:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S08.png]]&lt;br /&gt;
&lt;br /&gt;
Using ''putty'' logon to our Amahi HDA using the profile you created earlier.&lt;br /&gt;
&lt;br /&gt;
We must now create a directory and file in which to store our public key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And open our file that will store our key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;vi ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
Type '''''I''''' to enter insert mode. Paste your copied key (just a right click of the mouse was enough for me. Then '''''&amp;lt;Escape&amp;gt; :wq''''' to exit edit mode, write the file and quit. This file may already exist if you have used ssh before.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S09.png]]&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Configure PuTTY to use the private key==&lt;br /&gt;
&lt;br /&gt;
Close down your shell to your HDA and restart ''putty'' and load your ''192.168.1.67'' profile&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Go to '''''SSH &amp;gt;&amp;gt; Auth''''' and click on '''''Browse'''''&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S10.png]]&lt;br /&gt;
&lt;br /&gt;
Browse to the folder where you saved your keys and select the private key. The one with the '''''ppk''''' suffix.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S11.png]]&lt;br /&gt;
&lt;br /&gt;
Go back to your Session tab and click save.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Our private key is now attached to our profile&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Our key-based logon==&lt;br /&gt;
&lt;br /&gt;
Now on our PuTTY  sessions screen load your '''192.168.1.67''' profile and press ''Open''. You should get:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12.png]]&lt;br /&gt;
&lt;br /&gt;
Enter you passphrase that you input when generating your keys.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12a.png]]&lt;br /&gt;
&lt;br /&gt;
=Mac OS X - Terminal.app=&lt;br /&gt;
&lt;br /&gt;
==Open Terminal.app==&lt;br /&gt;
You can find Terminal.app in your Applications &amp;gt; Utilities folder.&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Accept all the defaults values (by hitting ENTER) to the questions you'll be asked.&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server.&lt;br /&gt;
&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
scp ~/.ssh/id_rsa.pub your_username@hda:.&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace ''your_username'' with the username you created on Fedora.&amp;lt;br/&amp;gt;&lt;br /&gt;
If your HDA is not yet setup, you might have to replace ''hda'' by your HDA' IP address too.&amp;lt;br/&amp;gt;&lt;br /&gt;
When prompted, enter the associated password.&lt;br /&gt;
&lt;br /&gt;
Then, we must copy that public key into the ''authorized_keys'' file.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;ssh your_username@hda&amp;lt;br /&amp;gt;&lt;br /&gt;
mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
mv id_rsa.pub .ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Linux=&lt;br /&gt;
&lt;br /&gt;
Follow the [[#Mac_OS_X_-_Terminal.app|Mac OS X instructions]], but use a standard terminal (Applications &amp;gt; System Tools &amp;gt; Terminal in Fedora).&lt;br /&gt;
&lt;br /&gt;
=Making it that tad more secure=&lt;br /&gt;
&lt;br /&gt;
Up to now, you can log in with your private/public key pair and still with username/password logins, so if someone doesn't attach a private key to his PuTTY session, he will be asked for a username and password. So to achieve a better security, we must disable the username/password logins (you should do this only when you know that your key-based logins are working, because if they aren't and you disable username/password logins, then you have a problem...).&lt;br /&gt;
&lt;br /&gt;
To disable the username/password logins, we must modify the sshd configuration file. On our Fedora based Amahi system, it's /etc/ssh/sshd_config. You should set Protocol to 2 (1 is insecure and should not be used!), PasswordAuthentication to no.&lt;br /&gt;
&lt;br /&gt;
Login as root:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;su -&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sshd/sshd_config&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S13.png]]&lt;br /&gt;
&lt;br /&gt;
You will now need to restart you SSH server&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
 service sshd restart&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=Greyhole&amp;diff=29893</id>
		<title>Greyhole</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=Greyhole&amp;diff=29893"/>
		<updated>2011-01-15T19:27:59Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: Fixed typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:apps]]&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .8em 1em; background-color: #E6F2FF; margin: 0px 1em;&amp;quot;&amp;gt;&lt;br /&gt;
'''NEW:''' [http://code.google.com/p/greyhole/wiki/MigrateFromWHS Widows Home Server Drive Extender Migration Guide]&lt;br /&gt;
&lt;br /&gt;
'''NEW:''' [[Greyhole troubleshooting]] guide&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is Greyhole ==&lt;br /&gt;
&lt;br /&gt;
A new feature in Amahi is [[Storage pooling]] using [http://greyhole.pommepause.com/ Greyhole]. Storage Pooling is a technology to pool disk drives and make them look as if they were all part of a single pool of disk space.&lt;br /&gt;
&lt;br /&gt;
This feature is installed by default, but requires a few simple steps to begin utilizing the features.&lt;br /&gt;
&lt;br /&gt;
You can add additional drives to your hda and prepare them for use in Greyhole by following [[Adding a second hard drive to your HDA|this tutorial]].&lt;br /&gt;
&lt;br /&gt;
To add a drive to your Greyhole storage pool. First open your dashboard and navigate to the Shares tab. Then click on the Storage Pool sub-category. You will see a page similar to the one below.&lt;br /&gt;
&lt;br /&gt;
== Important Warnings ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;color:darkred&amp;quot;&amp;gt;You should '''never''' change or delete files in the shared directories (''/var/hda/files/*'' by default) directly on the HDA, using the terminal, or the Gnome file browser, for the shares for which you checked the ''Uses pool'' option in the Amahi dashboard. If you want to work with files on Greyhole shares on the HDA, you should [[Mount Shares Locally]].&amp;lt;br/&amp;gt;&lt;br /&gt;
You should be safe reading existing files directly, or adding new files directly, as long as don't care that your new files will only be moved into the storage pool during the next check, which runs automatically at midnight (or manually using ''greyhole --fsck''). Until then, your new files will be stored in your shared directories (normally ''/var/hda/files/share_name/'').&lt;br /&gt;
&lt;br /&gt;
Also, touching anything inside the '''gh''' directories that Greyhole creates at the root of your partitions is a recipe for disaster.&lt;br /&gt;
&lt;br /&gt;
We [[Greyhole not on root | strongly discourage you from using the root partition in a drive pool]].&lt;br /&gt;
&amp;lt;/div&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== First things first ==&lt;br /&gt;
&lt;br /&gt;
You need to go in the Settings tab, and enable '''Advanced Settings'''.&amp;lt;br/&amp;gt;&lt;br /&gt;
Without Advanced Settings enabled, you won't see the following page and options.&lt;br /&gt;
&lt;br /&gt;
== For Storage Pool (Partitions) ==&lt;br /&gt;
&lt;br /&gt;
[[File:Storage_Pool_1.png|600px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
Select the drives you want available for your storage pool.&lt;br /&gt;
&lt;br /&gt;
== Greyhole options ==&lt;br /&gt;
&lt;br /&gt;
The next step is to select the share you want to replicate across the pool.&lt;br /&gt;
&lt;br /&gt;
From the Shares tab, select the Shares sub-catagory. We chose the Pictures share for this tutorial.&lt;br /&gt;
&lt;br /&gt;
[[File:Greyhole_Options_1.png|600px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
Check the option for &amp;quot;Uses pool&amp;quot; and choose the number of drives to replicate this share. In this instance we have chosen to use all drives available to the greyhole pool.&lt;br /&gt;
&lt;br /&gt;
Note: Greyhole is not a backup solution. If a file is removed, all copies are removed.&lt;br /&gt;
&lt;br /&gt;
== Greyhole advanced options ==&lt;br /&gt;
&lt;br /&gt;
You can further configure Greyhole by manually editing the following file:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''/var/hda/platform/html/config/greyhole.yml'''&lt;br /&gt;
&lt;br /&gt;
To see what options are available, and what they do, refer to the [http://greyhole.googlecode.com/svn/trunk/greyhole.example.conf sample greyhole.conf] provided with Greyhole.&lt;br /&gt;
&lt;br /&gt;
greyhole.yml is in in YAML format. Most of it should be easy enough to modify. The only exception would be the sticky_files (and optional sticky_into) options.&amp;lt;br/&amp;gt;&lt;br /&gt;
Here's an example of how those should appear:&lt;br /&gt;
&lt;br /&gt;
To specify the following to Greyhole in greyhole.conf:&lt;br /&gt;
&lt;br /&gt;
 sticky_files = Music/&lt;br /&gt;
 sticky_files = Videos/Movies/&lt;br /&gt;
     stick_into = /mnt/hdd1/gh&lt;br /&gt;
     stick_into = /mnt/hdd5/gh&lt;br /&gt;
 sticky_files = Backups/CrashPlan/&lt;br /&gt;
     stick_into = /mnt/hdd0/gh&lt;br /&gt;
&lt;br /&gt;
one should specify this in the greyhole.yml file, where '''precise indentation matters''':&lt;br /&gt;
&lt;br /&gt;
 sticky_files: &lt;br /&gt;
 - - Music/&lt;br /&gt;
 - - Videos/Movies/&lt;br /&gt;
   - - /mnt/hdd1/gh&lt;br /&gt;
     - /mnt/hdd5/gh&lt;br /&gt;
 - - Backups/CrashPlan/&lt;br /&gt;
   - - /mnt/hdd0/gh&lt;br /&gt;
&lt;br /&gt;
For your changes to be effective, you'll need to force Amahi to regenerate the greyhole.conf file. You can do so by editing a share, clicking it's path, and just clicking the Save button without actually changing the path.&lt;br /&gt;
&lt;br /&gt;
== Copying your data into Greyhole shares the first time ==&lt;br /&gt;
&lt;br /&gt;
When you start using Greyhole, you might want to copy or move all your exiting files into your new shares that use the storage pool.&lt;br /&gt;
&lt;br /&gt;
Note: This is not necessary if your files are already in Amahi shares. If they are there, and you enable the ''Uses pool'' option in the Amahi dashboard, the files will start getting moved around into the drives in your storage pool during the night (starting at midnight), when the nightly storage pool check starts.&amp;lt;br/&amp;gt;&lt;br /&gt;
The instructions below are for users who have more data to copy into the Greyhole shares than their currently free space in the /var/hda/files/ folder.&lt;br /&gt;
&lt;br /&gt;
One way to do that is to mount the shares that use the Greyhole storage pool, either on the HDA itself, or on a client computer on your local network, and copy your data from their existing location into the mounted shares.&lt;br /&gt;
This can be time consuming, but it is the safest way to use Greyhole.&lt;br /&gt;
&lt;br /&gt;
Another way to move your files from their current location into the storage pool is to share their current location using an Amahi share that ''Uses pool'', then let Greyhole nightly check move the files from there into the pool.&lt;br /&gt;
&lt;br /&gt;
Here's a more detailed walkthrough for this method:&lt;br /&gt;
&lt;br /&gt;
# Setup the Greyhole Storage Pool in the Amahi dashboard, Shares &amp;gt; Storage Pool page.&lt;br /&gt;
# Go in the Shares &amp;gt; Shares page. In there, make sure you have an existing share for each share you have data for. Create new ones if you need, remove the ones you don't need.&lt;br /&gt;
# Edit the ''path'' of each of those shares, and enter the current location of your existing data. For example, the Movies share could have a path = ''/media/External Drive/Movies''&lt;br /&gt;
# Enable the ''Uses pool'' option for each of your shares, and select the number of extra copies you'd like, if any.&lt;br /&gt;
# Now, you either need to wait for Greyhole'S nightly check to start, or you can start it manually from a terminal, as root, using this command: greyhole --fsck&lt;br /&gt;
# Monitor /var/log/greyhole.log to see when the ''fsck'' operation is done.&lt;br /&gt;
# Once ''fsck'' is done, your data has now been moved into the Greyhole storage pool (in the drives you selected in Shares &amp;gt; Storage Pool). All that should be left in the previous location of your data (''/media/External Drive/Movies'' from the previous example) should be symbolic links pointing to the new file copies. If the previous location is just empty directories (no symlinks), do not panic. This is normal if your previous location is an NTFS or FAT partition (drive).&lt;br /&gt;
# Move all those directories / symlinks from there into the correct folders in /var/hda/files/share_name&lt;br /&gt;
# Back in the Amahi dashboard, edit the path of the shares once again, and put back ''/var/hda/files/share_name'' (i.e. the folders where you moved the symbolic links).&lt;br /&gt;
# If you used an NTFS or FAT partition for the previous location, you'll need another fsck to create the symlinks where they should be. Either wait for midnight, or launch it manually, from a command line, as root: ''greyhole --fsck''&lt;br /&gt;
&lt;br /&gt;
You're done. All your existing data is now stored in the various drives included in your storage pool, and are accessible via the Samba shares you have defined in the Amahi dashboard.&lt;br /&gt;
&lt;br /&gt;
== /media ==&lt;br /&gt;
Including any drive mounted as /media/Something in your storage pool is usually a bad idea.&amp;lt;br/&amp;gt;&lt;br /&gt;
Those mounts are created by the ''gnome-automounter'', which requires you to be logged in into X (Gnome) to become available.&amp;lt;br/&amp;gt;&lt;br /&gt;
This will create issues with Greyhole, which expects drives to always be available, and will take action when some of them are missing.&lt;br /&gt;
&lt;br /&gt;
Follow this guide to [[Adding a second hard drive to your HDA|permanently mount your drives]], before you include them in your storage pool.&lt;br /&gt;
&lt;br /&gt;
== Monitoring Greyhole ==&lt;br /&gt;
Sometimes you might want to monitor what Greyhole is doing, for example when writing data to your greyhole shares for the first time. Here are a few commands you can type in a terminal to follow along.&lt;br /&gt;
&lt;br /&gt;
'''Scrolling view of total Greyhole operations queue:'''&lt;br /&gt;
 while [ 1 == 1 ]; do greyhole --view-queue | grep Total; sleep 60; done&lt;br /&gt;
&lt;br /&gt;
'''Scrolling log of what files Greyhole is working on right now:'''&lt;br /&gt;
 tail -f /var/log/greyhole.log&lt;br /&gt;
&lt;br /&gt;
== Convert Greyhole from SQLite to MySQL ==&lt;br /&gt;
Greyhole is at the time of writing using SQLite as the default database for queueing up tasks on Amahi. This is unqie to Amahi as Greyhole was originally designed to use MySQL for this task.&lt;br /&gt;
&lt;br /&gt;
There are some major performance benefits to using MySQL over SQLite when writing large amounts of files. Switching can be especially useful when moving data to greyhole shares for the first time. For now there is a script you can run if you want to switch over. This script has been tested to be safe while greyhole is working but should be used with discresion.&lt;br /&gt;
&lt;br /&gt;
''To Convert to MySQL, run as root:''&lt;br /&gt;
&lt;br /&gt;
   /usr/share/greyhole/db_migration-sqlite2mysql.sh&lt;br /&gt;
&lt;br /&gt;
To see what DB engine is Greyhole using, do this:&lt;br /&gt;
&lt;br /&gt;
    grep db_engine /etc/greyhole.conf&lt;br /&gt;
&lt;br /&gt;
== Disable Greyhole ==&lt;br /&gt;
For those who do not use Greyhole, you can disable it.  This is based on the fact you never have used it by enabling 'Uses pool' on any share.  Recommend using extreme caution as this could have unpredictable results.&lt;br /&gt;
&lt;br /&gt;
Perform the following steps as user '''root''':&lt;br /&gt;
&lt;br /&gt;
 chkconfig greyhole off&lt;br /&gt;
 rm /etc/monit.d/greyhole.conf&lt;br /&gt;
 service monit restart&lt;br /&gt;
 service greyhole stop&lt;br /&gt;
&lt;br /&gt;
'''DO NOT''' attempt to remove the Greyhole package as it is a dependency of the HDA software.  Doing so will break your HDA.&lt;br /&gt;
&lt;br /&gt;
= Testing and Reliability =&lt;br /&gt;
&lt;br /&gt;
Check out the [[Greyhole grinder]] to help make Greyhole rock solid.&lt;br /&gt;
&lt;br /&gt;
= Greyhole Troubleshooting =&lt;br /&gt;
&lt;br /&gt;
[[Greyhole troubleshooting]] guide&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=12109</id>
		<title>Key-Based SSH Logins</title>
		<link rel="alternate" type="text/html" href="https://wiki.amahi.org/index.php?title=Key-Based_SSH_Logins&amp;diff=12109"/>
		<updated>2010-05-02T22:35:17Z</updated>

		<summary type="html">&lt;p&gt;Crxtasy12: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''This page shows how to create a key based SSH login to your server using the Windows PuTTY client, Mac OS X Terminal.app or Linux.'''&lt;br /&gt;
&lt;br /&gt;
This will allow you to safely login using SSH onto your HDA without having to provide a password every time.&lt;br /&gt;
&lt;br /&gt;
=Windows - PuTTY=&lt;br /&gt;
&lt;br /&gt;
==Install Putty and PuttyGen==&lt;br /&gt;
Download the following files from the [http://www.chiark.greenend.org.uk/%7Esgtatham/putty/download.html PuTTY download] page and save them on your Windows system, e.g. on the desktop:&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe http://the.earth.li/~sgtatham/putty/latest/x86/putty.exe]&lt;br /&gt;
&lt;br /&gt;
[http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe http://the.earth.li/~sgtatham/putty/latest/x86/puttygen.exe]&lt;br /&gt;
&lt;br /&gt;
Both files are self contained executables. That is: they do not install anything but run from where they are saved.&lt;br /&gt;
&lt;br /&gt;
==Create a profile for use with your Amahi HDA==&lt;br /&gt;
In PuTTY, you can create profiles for connections to your various SSH servers, so you don't have to type in the settings again when you want to connect to a certain server again.&lt;br /&gt;
&lt;br /&gt;
Now we will create a profile for our 192.168.1.67 server. Start PuTTY by double-clicking its executable file. You are now in the category Session (see the tree on the left side of the screenshot). Enter 192.168.1.67 under Host Name (or IP address), enter 22 under Port and select SSH under Protocol. &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Now select '''Connection &amp;gt;&amp;gt; Data'' in the Catagory box and in the Auto-login box enter the username you wish to login to your HDA with. In this example 'sue'.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S02.png]]&lt;br /&gt;
&lt;br /&gt;
Once this is done return to your Sessions and give your profile a meaningful name and press save. Anytime in the future you can click on your profile name a ''Open'' and your session is opened. You will appreciate this more later.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Connecting to your HDA using SSH==&lt;br /&gt;
&lt;br /&gt;
Now you are on your 'Sessions' screen lets open our session by pressing open. You should see:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S03.png]]&lt;br /&gt;
&lt;br /&gt;
Type in the users password and you have your ssh xterm ready to go. Now this was the normal way of logging in but being a password system it is open to brute force attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
&lt;br /&gt;
Here we can use PuTTYgen to create a private/public key pair. Start it by double-clicking its executable file. Make sure you select SSH-2 RSA under Type of key to generate and specify 1024 as the Number of bits in a generated key. Then click on Generate: &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S04.png]]&lt;br /&gt;
&lt;br /&gt;
Move your mouse about randomly to generate the randomness.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05.png]]&lt;br /&gt;
&lt;br /&gt;
Now a private/public key pair has been generated. Under Key comment, you can enter any comment; normally you use your email address here. Then specify a Key passphrase and repeat it under Confirm passphrase. You'll need that passphrase to log in to SSH with your new key. Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S05a.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save public key and save it in some safe location on your computer. You are free to choose a filename and extension, but it should be one that lets you remember for which system it is.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S06.png]]&lt;br /&gt;
&lt;br /&gt;
Then click on Save private key. You can save it in the same location as the public key - it should be a location that only you can access and that you don't lose! (If you lose the keys and have disabled username/password logins, then you can't log in anymore!) Again, you're free to choose a filename, but this time the extension must be '''''.ppk''''': &lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S07.png]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server. Copy the key from the PuttyGEN window:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S08.png]]&lt;br /&gt;
&lt;br /&gt;
Using ''putty'' logon to our Amahi HDA using the profile you created earlier.&lt;br /&gt;
&lt;br /&gt;
We must now create a directory and file in which to store our public key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
And open our file that will store our key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;vi ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
Type '''''I''''' to enter insert mode. Paste your copied key (just a right click of the mouse was enough for me. Then '''''&amp;lt;Escape&amp;gt; :wq''''' to exit edit mode, write the file and quit. This file may already exist if you have used ssh before.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S09.png]]&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Configure PuTTY to use the private key==&lt;br /&gt;
&lt;br /&gt;
Close down your shell to your HDA and restart ''putty'' and load your ''192.168.1.67'' profile&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Go to '''''SSH &amp;gt;&amp;gt; Auth''''' and click on '''''Browse'''''&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S10.png]]&lt;br /&gt;
&lt;br /&gt;
Broswe to the folder where you saved your keys and select the private key. The one with the '''''ppk''''' suffix.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S11.png]]&lt;br /&gt;
&lt;br /&gt;
Go back to your Session tab and click save.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S01.png]]&lt;br /&gt;
&lt;br /&gt;
Our private key is now attached to our profile&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Our key-based logon==&lt;br /&gt;
&lt;br /&gt;
Now on our PuTTY  sessions screen load your '''192.168.1.67''' profile and press ''Open''. You should get:&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12.png]]&lt;br /&gt;
&lt;br /&gt;
Enter you passphrase that you input when generating your keys.&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S12a.png]]&lt;br /&gt;
&lt;br /&gt;
=Mac OS X - Terminal.app=&lt;br /&gt;
&lt;br /&gt;
==Open Terminal.app==&lt;br /&gt;
You can find Terminal.app in your Applications &amp;gt; Utilities folder.&lt;br /&gt;
&lt;br /&gt;
==Generating a public/private key pair==&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
ssh-keygen -t rsa&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Accept all the defaults values (by hitting ENTER) to the questions you'll be asked.&lt;br /&gt;
&lt;br /&gt;
==Save the public key on our Amahi server==&lt;br /&gt;
&lt;br /&gt;
Now we must transfer the public key to our Amahi HDA server.&lt;br /&gt;
&lt;br /&gt;
Execute the following command, in Terminal.app:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
scp ~/.ssh/id_rsa.pub your_username@hda:.&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace ''your_username'' with the username you created on Fedora.&amp;lt;br/&amp;gt;&lt;br /&gt;
If your HDA is not yet setup, you might have to replace ''hda'' by your HDA' IP address too.&amp;lt;br/&amp;gt;&lt;br /&gt;
When prompted, enter the associated password.&lt;br /&gt;
&lt;br /&gt;
Then, we must copy that public key into the ''authorized_keys'' file.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;ssh your_username@hda&amp;lt;br /&amp;gt;&lt;br /&gt;
mkdir ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
chmod 700 ~/.ssh&amp;lt;br /&amp;gt;&lt;br /&gt;
mv id_rsa.pub .ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Now to make that file accessible by only the user&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;chmod 600 ~/.ssh/authorized_keys2&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Linux=&lt;br /&gt;
&lt;br /&gt;
Follow the [[#Mac_OS_X_-_Terminal.app|Mac OS X instructions]], but use a standard terminal (Applications &amp;gt; System Tools &amp;gt; Terminal in Fedora).&lt;br /&gt;
&lt;br /&gt;
=Making it that tad more secure=&lt;br /&gt;
&lt;br /&gt;
Up to now, you can log in with your private/public key pair and still with username/password logins, so if someone doesn't attach a private key to his PuTTY session, he will be asked for a username and password. So to achieve a better security, we must disable the username/password logins (you should do this only when you know that your key-based logins are working, because if they aren't and you disable username/password logins, then you have a problem...).&lt;br /&gt;
&lt;br /&gt;
To disable the username/password logins, we must modify the sshd configuration file. On our Fedora based Amahi system, it's /etc/ssh/sshd_config. You should set Protocol to 2 (1 is insecure and should not be used!), PasswordAuthentication to no.&lt;br /&gt;
&lt;br /&gt;
Login as root:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;su -&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 vi /etc/sshd/sshd_config&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:Red-S13.png]]&lt;br /&gt;
&lt;br /&gt;
You will now need to restart you SSH server&lt;br /&gt;
&amp;lt;div style=&amp;quot;border: 1px solid #A3B1BF; padding: .5em 1em; color: #000; background-color: #E6F2FF; margin: 3px 3px 1em 3px;&amp;quot;&amp;gt;&lt;br /&gt;
 service sshd restart&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Crxtasy12</name></author>
		
	</entry>
</feed>