• Hi, Pleskians! We are running a UX testing of our upcoming product intended for server management and monitoring.
    We would like to invite you to have a call with us and have some fun checking our prototype. The agenda is pretty simple - we bring new design and some scenarios that you need to walk through and succeed. We will be watching and taking insights for further development of the design.
    If you would like to participate, please use this link to book a meeting. We will sent the link to the clickable prototype at the meeting.
  • (Plesk for Windows):
    MySQL Connector/ODBC 3.51, 5.1, and 5.3 are no longer shipped with Plesk because they have reached end of life. MariaDB Connector/ODBC 64-bit 3.2.4 is now used instead.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.

Resolved Plesk Migrator Authorization SSH key from cPanel

tanasis

Regular Pleskian
Hello,
I did this Authentication by SSH (Linux)

[root@server ~]# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa): 512key
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in 512key.
Your public key has been saved in 512key.pub.
The key fingerprint is:
SHA256:q18N..................Cw4 [email protected]
The key's randomart image is:
+---[RSA 3072]----+
| |
....................
| .o+==O== |
+----[SHA256]-----+

[root@server ~]# ssh-copy-id [email protected]
/usr/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/root/.ssh/id_rsa.pub"
The authenticity of host '1xx.2xx.2xx.1x (1xx.2xx.2xx.1x)' can't be established.
ECDSA key fingerprint is SHA256:vR+R...........................................++OYo.

What am I doing wrong ?
 
Does the server to where you want to write the key allow root access through SSH (PermitRootLogin = yes)?
 
If that was the cause, I suggest to limit root login to the target server only, e.g. set the general PermitRootLogin variable to "no", but add two lines to the end of the file:
Code:
Match Address <IP address of the target>
PermitRootLogin yes
This way only the target will be allowed to login by root, but no other ip.
 
Back
Top