How to Enable SSH Debian [11 Simple Steps]


To enable SSH Debian, you can follow these steps:

  1. Verify if SSH is already installed on your Debian system by running the command dpkg -l | grep openssh-server
  2. Ensure you have the latest package information by updating the package manager with the command sudo apt update. This command fetches the latest updates and metadata for available packages.
  3. Install the openssh-server package using the package manager by running the command sudo apt install openssh-server. This command installs the SSH server software on your Debian system.
  4. Edit the SSH server configuration file using the command sudo nano /etc/ssh/sshd_config. This file allows you to customize various options for the SSH server, such as port number, protocol versions, login grace time, allowed users, and root login permissions.

Read the guide below to learn different methods to enable SSH on Debian. Also, learn the common errors that can occur when enabling SSH with possible solutions.

Accessing your Debian system remotely can be a challenge, but enabling SSH makes it secure and straightforward. If you’ve struggled with remote management, this guide will walk you through enabling SSH on Debian, from installation to configuration and troubleshooting. You’ll learn how to Debian enable SSH access, secure your connections, and resolve common issues like connection refusals and authentication errors. By the end, you’ll have a reliable SSH setup for seamless remote access.

What is SSH?

SSH, or Secure Shell, is a network protocol used to securely access and manage devices over an unsecured network. It encrypts the connection between the client and the server, protecting against eavesdropping, connection hijacking, and other attacks.

How SSH Works?

SSH uses public key cryptography to secure connections. Here’s a simplified version of how it works:

  1. Key Pair Generation: The user generates a pair of keys—a private key (kept secret) and a public key (shared with the server).
  2. Public Key Sharing: The public key is added to the server’s authorized keys file.
  3. Authentication: When the user attempts to connect, the server uses the public key to create a challenge that can only be solved with the private key. If the user’s private key solves the challenge, the server authenticates the user.

Benefits of Using SSH: Security, Convenience, Flexibility

  • Security: SSH encrypts all data transmitted between the client and the server, ensuring privacy and data integrity.
  • Convenience: With SSH, users can manage remote devices, transfer files, and execute commands from anywhere with internet access.
  • Flexibility: SSH supports various authentication methods (passwords, public keys), tunneling, and port forwarding, making it versatile for different use cases.

SSH vs. Other Remote Access Protocols

Why SSH is the Preferred Choice for Linux Users

Linux users prefer SSH because it is secure, reliable, and integrated into most Linux distributions. Its command-line interface allows efficient remote management, and it supports various automation and scripting tasks.

How to Enable SSH Debian

To enable SSH on Debian, start by updating your package list with sudo apt update. Next, install the OpenSSH server using sudo apt install openssh-server. Check the SSH service status with sudo systemctl status ssh, then start and enable the service using sudo systemctl start ssh and sudo systemctl enable ssh. Secure your setup by configuring the SSH settings in /etc/ssh/sshd_config, and finally, test the connection with ssh username@your_server_ip.

That was the quick answer. Here are the detailed steps to Debian enable SSH:

Prerequisites for Enabling SSH on Debian

Before enabling SSH on a Debian system, ensure your setup meets these requirements and follow the preparation steps.

  • Compatible Debian Versions: Debian 10 (Buster) and later versions are recommended.
  • Required Disk Space and Memory: Ensure at least 100 MB of free disk space and 512 MB of RAM for smooth operation.

Before you can enable SSH on your Debian server, you need to ensure that it is installed and configured correctly. Follow these steps:

  1. Open your command window.
opening terminal 16
  1. Enter the following command to check if SSH is already installed on your Debian system:
dpkg -l | grep openssh-server
  1. If you see output similar to ii openssh-server, it means SSH is already installed. If not, proceed to the next step.
checking if openssh is installed or not
  1. Update the package manager (apt) to ensure you have the latest package information:
sudo apt update

This command fetches the latest updates and metadata for available packages.

updating system package list 7
  1. Install the openssh-server package using the package manager:
sudo apt install openssh-server

This command installs the SSH server package on your Debian system.

installing openssh server 1
  1. On your local system, open a Terminal and run the following command to generate a new SSH key pair:
ssh-keygen -t rsa

This command generates an RSA key pair with a 4096-bit key size. Replace with your email address.

generating ssh key pair
  1. After generating the key pair, you need to copy the public key to your Debian server. Use the following command to copy the public key to the server:
ssh-copy-id username@debian_server_ip

Replace username with your username on the Debian server and debian_server_ip with the IP address of your Debian server.

copying public key to the server
  1. To configure the SSH server on your Debian system, run the following command to locate the SSH server configuration file:
sudo nano /etc/ssh/sshd_config

This command opens the configuration file in the nano text editor. Make changes to the file as necessary.

opening ssh server configuration file
  1. Within the SSH server configuration file, you can customize various options to enhance performance and security. Some key options to consider are:
  • Port Number: Change the default SSH port (22) to a non-standard port for added security.
  • Protocol Version: Disable outdated SSH protocol versions (e.g., SSH1) for better security.
  • LoginGraceTime: Configure a specific grace period for login authentication.
  • AllowUsers: Specify the users who are allowed to connect via SSH.
  • PermitRootLogin: Disable root login for SSH to enhance security.
configure the file as per your needs
  1. On your Debian server, enter the following command to check if the SSH service is running:
systemctl status ssh

If the service is active and running, you should see an output indicating its status.

checking ssh service status
  1. On your local system, open a Terminal and enter the following command to establish an SSH connection with your Debian server:
ssh username@debian_server_ip

Replace username with your username on the Debian server and debian_server_ip with the IP address of your Debian server. If successful, you’ll be prompted to enter the passphrase for your SSH key (if applicable).

establishing connection with ssh server

Configuring Firewalls to Allow SSH Connection Debian

Ensure your firewall settings permit SSH traffic.

  1. For UFW (Uncomplicated Firewall) configuration, run the command:
sudo ufw allow ssh

This command creates a firewall rule that allows incoming SSH connections.

allowing ssh connections on debian
  1. For IPTables configuration, run the command:
sudo iptables -A INPUT -p tcp --dport 22 -j ACCEPT

This command adds a rule to IPTables to accept incoming connections on the default SSH port (or the port you’ve configured).

adding rule to iptables

5 Common Errors When Enabling SSH on Debian

Enabling SSH on Debian may come with its fair share of obstacles. By understanding these common errors and their solutions, you can troubleshoot SSH connectivity issues effectively. Here are five common errors that you may encounter:

  • 🚫 Connection Refused: This error occurs when the SSH service is not running or the server is unreachable. Ensure SSH is running using systemctl status ssh and verify network settings, including firewalls or routers that might block the connection.
  • ⛔️ Incorrect SSH Port: This happens when the default SSH port is changed. Ensure you specify the correct port number when connecting and update firewall settings to allow the new port.
  • 🔒 Permission Denied (Public Key): This indicates the server failed to authenticate the public key. Verify that the correct public key is copied to the server, file permissions are correct, and the corresponding private key is available on the client side.
  • 🔑 Authentication Failure (Password): This usually indicates a password issue. Ensure the correct password is used, checking for typos and case sensitivity. Consider switching to key-based authentication for better security and convenience.
  • 🔄 SSH Host Identification Change: This occurs when the client’s known host key differs from the server’s key, often due to server changes. Remove the old host key entry from the known_hosts file, then reconnect to update the file with the new key.

Debian SSH Enable: Summing Up

By following this step-by-step guide, you can successfully enable SSH on Debian, from updating your package list to installing OpenSSH and configuring security settings. If you encounter any issues, troubleshooting tips will help you resolve common problems like connection refusals and authentication errors.

I hope this guide has been helpful. For more advanced knowledge, consider exploring the following articles:

Frequently Asked Questions

Can I enable SSH on Debian without root access?

Yes, it is possible to enable SSH on Debian without root access. Although SSH’s initial installation and configuration require administrative privileges, once SSH is set up, you can grant non-root users the ability to use SSH for remote access. To achieve this, the system administrator needs to create user accounts and assign appropriate permissions to those users. By granting these users the necessary permissions, they can then establish SSH connections to the Debian server using their credentials without requiring root access.

How can I change the default SSH port on Debian?

To change the default SSH port on Debian, you need to modify the SSH server configuration file, which is typically located at /etc/ssh/sshd_config. Open this file using a text editor with root privileges. Look for the line that specifies the default port (usually Port 22) and change it to your desired port number. Choose a non-standard port that is not commonly used or reserved for other services. Once you’ve made the changes, save the file and restart the SSH service for the modifications to take effect.

Is it possible to limit SSH access to specific IP addresses?

Yes, you can restrict SSH access to specific IP addresses or subnets on Debian by implementing firewall rules. Tools like tcpd or iptables can help you achieve this. By configuring the firewall settings, you can define access rules that only allow SSH connections from specific IP addresses or IP ranges. This adds an extra layer of security to your SSH setup by limiting access to trusted sources.

Can I configure SSH to use a different encryption algorithm?

Absolutely! You have the flexibility to configure SSH to use different encryption algorithms on Debian. The SSH server configuration file, usually located at /etc/ssh/sshd_config, allows you to specify various encryption-related settings. Look for the relevant options such as Ciphers or MACs to define your preferred encryption algorithms. It’s essential to choose encryption algorithms that are secure, widely supported, and have no known vulnerabilities.

Debian Enable SSH Login: Why can’t I enable it on my server?

If you can’t enable ssh login, ensure that the OpenSSH server is correctly installed and the SSH service is running. Check your network settings and firewalls to make sure they Debian allow SSH login. Verify that the SSH configuration file /etc/ssh/sshd_config is correctly set up and that the SSH port is open.



Ojash is a skilled Linux expert and tech writer with over a decade of experience. He has extensive knowledge of Linux's file system, command-line interface, and software installations. Ojash is also an expert in shell scripting and automation, with experience in Bash, Python, and Perl. He has published numerous articles on Linux in various online publications, making him a valuable resource for both seasoned Linux users and beginners. Ojash is also an active member of the Linux community and participates in Linux forums.



Akshat is a software engineer, product designer and the co-founder of Scrutify. He's an experienced Linux professional and the senior editor of this blog. He is also an open-source contributor to many projects on Github and has written several technical guides on Linux. Apart from that, he’s also actively sharing his ideas and tutorials on Medium and Attirer. As the editor of this blog, Akshat brings his wealth of knowledge and experience to provide readers with valuable insights and advice on a wide range of Linux-related topics.

Share this article
Shareable URL
Prev Post

How to Add User to Sudoers in Debian [3 Effective Ways]

Next Post

How to Clear apt Cache in Ubuntu [3 Effective Methods]

Leave a Reply

Your email address will not be published. Required fields are marked *

Read next