Sign In
Sign In

How to Use SSH Keys for Authentication

How to Use SSH Keys for Authentication
Hostman Team
Technical writer
Linux Servers SSH
30.01.2025
Reading time: 10 min

Many cloud applications are built on the popular SSH protocol—it is widely used for managing network infrastructure, transferring files, and executing remote commands.

SSH stands for Secure Socket Shell, meaning it provides a shell (command-line interface) around the connection between multiple remote hosts, ensuring that the connection is secure (encrypted and authenticated).

SSH connections are available on all popular operating systems, including Linux, Ubuntu, Windows, and Debian. The protocol establishes an encrypted communication channel within an unprotected network by using a pair of public and private keys.

Keys: The Foundation of SSH

SSH operates on a client-server model. This means the user has an SSH client (a terminal in Linux or a graphical application in Windows), while the server side runs a daemon, which accepts incoming connections from clients.

In practice, an SSH channel enables remote terminal management of a server. In other words, after a successful connection, everything entered in the local console is executed directly on the remote server.

The SSH protocol uses a pair of keys for encrypting and decrypting information: public key and private key.

These keys are mathematically linked. The public key is shared openly, resides on the server, and is used to encrypt data. The private key is confidential, resides on the client, and is used to decrypt data.

Of course, keys are not generated manually but with special tools—keygens. These utilities generate new keys using encryption algorithms fundamental to SSH technology.

More About How SSH Works

Exchange of Public Keys

SSH relies on symmetric encryption, meaning two hosts wishing to communicate securely generate a unique session key derived from the public and private data of each host.

For example, host A generates a public and private key pair. The public key is sent to host B. Host B does the same, sending its public key to host A.

Using the Diffie-Hellman algorithm, host A can create a key by combining its private key with the public key of host B. Likewise, host B can create an identical key by combining its private key with the public key of host A.

This results in both hosts independently generating the same symmetric encryption key, which is then used for secure communication. Hence, the term symmetric encryption.

Message Verification

To verify messages, hosts use a hash function that outputs a fixed-length string based on the following data:

  • The symmetric encryption key
  • The packet number
  • The encrypted message text

The result of hashing these elements is called an HMAC (Hash-based Message Authentication Code). The client generates an HMAC and sends it to the server. The server then creates its own HMAC using the same data and compares it to the client's HMAC. If they match, the verification is successful, ensuring that the message is authentic and hasn't been tampered with.

Host Authentication

Establishing a secure connection is only part of the process. The next step is authenticating the user connecting to the remote host, as the user may not have permission to execute commands.

There are several authentication methods:

  • Password Authentication: The user sends an encrypted password to the server. If the password is correct, the server allows the user to execute commands.
  • Certificate-Based Authentication: The user initially provides the server with a password and the public part of a certificate. Once authenticated, the session continues without requiring repeated password entries for subsequent interactions.

These methods ensure that only authorized users can access the remote system while maintaining secure communication.

Encryption Algorithms

A key factor in the robustness of SSH is that decrypting the symmetric key is only possible with the private key, not the public key, even though the symmetric key is derived from both. Achieving this property requires specific encryption algorithms.

There are three primary classes of such algorithms: RSA, DSA, and algorithms based on elliptic curves, each with distinct characteristics:

  • RSA: Developed in 1978, RSA is based on integer factorization. Since factoring large semiprime numbers (products of two large primes) is computationally difficult, the security of RSA depends on the size of the chosen factors. The key length ranges from 1024 to 16384 bits.
  • DSA: DSA (Digital Signature Algorithm) is based on discrete logarithms and modular exponentiation. While similar to RSA, it uses a different mathematical approach to link public and private keys. DSA key length is limited to 1024 bits.
  • ECDSA and EdDSA: These algorithms are based on elliptic curves, unlike DSA, which uses modular exponentiation. They assume that no efficient solution exists for the discrete logarithm problem on elliptic curves. Although the keys are shorter, they provide the same level of security.

Key Generation

Each operating system has its own utilities for quickly generating SSH keys.

In Unix-like systems, the command to generate a key pair is:

ssh-keygen -t rsa

Here, the type of encryption algorithm is specified using the -t flag. Other supported types include:

  • dsa
  • ecdsa
  • ed25519

You can also specify the key length with the -b flag. However, be cautious, as the security of the connection depends on the key length:

ssh-keygen -b 2048 -t rsa

After entering the command, the terminal will prompt you to specify a file path and name for storing the generated keys. You can accept the default path by pressing Enter, which will create standard file names: id_rsa (private key) and id_rsa.pub (public key).

Thus, the public key will be stored in a file with a .pub extension, while the private key will be stored in a file without an extension.

Next, the command will prompt you to enter a passphrase. While not mandatory (it is unrelated to the SSH protocol itself), using a passphrase is recommended to prevent unauthorized use of the key by a third-party user on the local Linux system. Note that if a passphrase is used, you must enter it each time you establish the connection.

To change the passphrase later, you can use:

ssh-keygen -p

Or, you can specify all parameters at once with a single command:

ssh-keygen -p old_password -N new_password -f path_to_files

For Windows, there are two main approaches:

  1. Using ssh-keygen from OpenSSH: The OpenSSH client provides the same ssh-keygen command as Linux, following the same steps.

  2. Using PuTTY: PuTTY is a graphical application that allows users to generate public and private keys with the press of a button.

Installing the Client and Server Components

The primary tool for an SSH connection on Linux platforms (both client and server) is OpenSSH. While it is typically pre-installed on most operating systems, there may be situations (such as with Ubuntu) where manual installation is necessary.

The general command for installing SSH, followed by entering the superuser password, is:

sudo apt-get install ssh

However, in some operating systems, SSH may be divided into separate components for the client and server.

For the Client

To check whether the SSH client is installed on your local machine, simply run the following command in the terminal:

ssh

If SSH is supported, the terminal will display a description of the command. If nothing appears, you’ll need to install the client manually:

sudo apt-get install openssh-client

You will be prompted to enter the superuser password during installation. Once completed, SSH connectivity will be available.

For the Server

Similarly, the server-side part of the OpenSSH toolkit is required on the remote host.

To check if the SSH server is available on your remote host, try connecting locally via SSH:

ssh localhost

If the SSH daemon is running, you will see a message indicating a successful connection. If not, you’ll need to install the SSH server:

sudo apt-get install openssh-server

As with the client, the terminal will prompt you to enter the superuser password. After installation, you can check whether SSH is active by running:

sudo service ssh status

Once connected, you can modify SSH settings as needed by editing the configuration file:

./ssh/sshd_config

For example, you might want to change the default port to a custom one. Don’t forget that after making changes to the configuration, you must manually restart the SSH service to apply the updates:

sudo service ssh restart

Copying an SSH Key to the Server

On Hostman, you can easily add SSH keys to your servers using the control panel.

Using a Special Copy Command

After generating a public SSH key, it can be used as an authorized key on a server. This allows quick connections without the need to repeatedly enter a password.

The most common way to copy the key is by using the ssh-copy-id command:

ssh-copy-id -i ~/.ssh/id_rsa.pub name@server_address

This command assumes you used the default paths and filenames during key generation. If not, simply replace ~/.ssh/id_rsa.pub with your custom path and filename.

  • Replace name with the username on the remote server.

  • Replace server_address with the host address. If the usernames on both the client and server are the same, you can shorten the command:

ssh-copy-id -i ~/.ssh/id_rsa.pub server_address

If you set a passphrase during the SSH key creation, the terminal will prompt you to enter it. Otherwise, the key will be copied immediately.

In some cases, the server may be configured to use a non-standard port (the default is 22). If that’s the case, specify the port using the -p flag:

ssh-copy-id -i ~/.ssh/id_rsa.pub -p 8129 name@server_address

Semi-Manual Copying

There are operating systems where the ssh-copy-id command may not be supported, even though SSH connections to the server are possible. In such cases, the copying process can be done manually using a series of commands:

ssh name@server_address 'mkdir -pm 700 ~/.ssh; echo ' $(cat ~/.ssh/id_rsa.pub) ' >> ~/.ssh/authorized_keys; chmod 600 ~/.ssh/authorized_keys'

This sequence of commands does the following:

  1. Creates a special .ssh directory on the server (if it doesn’t already exist) with the correct permissions (700) for reading and writing.

  2. Creates or appends to the authorized_keys file, which stores the public keys of all authorized users. The public key from the local file (id_rsa.pub) will be added to it.

  3. Sets appropriate permissions (600) on the authorized_keys file to ensure it can only be read and written by the owner.

If the authorized_keys file already exists, it will simply be appended with the new key.

Once this is done, future connections to the server can be made using the same SSH command, but now the authentication will use the public key added to authorized_keys:

ssh name@server_address

Manual Copying

Some hosting platforms offer server management through alternative interfaces, such as a web-based control panel. In these cases, there is usually an option to manually add a public key to the server. The web interface might even simulate a terminal for interacting with the server.

Regardless of the method, the remote host must contain a file named ~/.ssh/authorized_keys, which lists all authorized public keys.

Simply copy the client’s public key (found in ~/.ssh/id_rsa.pub by default) into this file.

If the key pair was generated using a graphical application (typically PuTTY on Windows), you should copy the public key directly from the application and add it to the existing content in authorized_keys.

Connecting to a Server

To connect to a remote server on a Linux operating system, enter the following command in the terminal:

ssh name@server_address

Alternatively, if the local username is identical to the remote username, you can shorten the command to:

ssh server_address

The system will then prompt you to enter the password. Type it and press Enter. Note that the terminal will not display the password as you type it.

Just like with the ssh-copy-id command, you can explicitly specify the port when connecting to a remote server:

ssh client@server_address -p 8129

Once connected, you will have control over the remote machine via the terminal; any command you enter will be executed on the server side.

Conclusion

Today, SSH is one of the most widely used protocols in development and system administration. Therefore, having a basic understanding of its operation is crucial.

This article aimed to provide an overview of SSH connections, briefly explain the encryption algorithms (RSA, DSA, ECDSA, and EdDSA), and demonstrate how public and private key pairs can be used to establish secure connections with a personal server, ensuring that exchanged messages remain inaccessible to third parties.

We covered the primary commands for UNIX-like operating systems that allow users to generate key pairs and grant clients SSH access by copying the public key to the server, enabling secure connections.

Linux Servers SSH
30.01.2025
Reading time: 10 min

Similar

Linux

How to Mount an SMB Share in Linux

The Server Message Block (SMB) protocol facilitates network file sharing, allowing applications to read and write to files and request services from server programs. This protocol is pivotal for seamless communication between different devices in a network, particularly in mixed OS environments like Windows and Linux. Mounting an SMB share in Linux enables users to access files on a Windows server or another SMB-enabled device directly from their Linux system. This tutorial will guide you through the process of mounting an SMB share on Linux, ensuring smooth file sharing and network communication. Prerequisites for Mounting SMB Shares Before mounting an SMB share, ensure the following prerequisites are met: A Linux system, such as a Hostman cheap cloud server, with root or sudo privileges. The cifs-utils package installed on your Linux system. Access credentials (username and password) for the SMB share. Network connectivity between your Linux system and the SMB server. Installing Necessary Packages The cifs-utils package is essential for mounting SMB shares on Linux. Additionally, the psmisc package provides the fuser command, which helps manage and monitor file usage. Update Package List and Upgrade System First, update your package list and upgrade your system: sudo apt update Install cifs-utils and psmisc Install the necessary packages: sudo apt install cifs-utils psmisc Verify Installation Verify the installation of cifs-utils and availability of the fuser command: mount -t cifsfuser Finding SMB Share Details Identify the SMB share details, including the server name or IP address and the share name. You might need to consult your network administrator or check the server configuration. Example: Server: smbserver.example.com Share: sharedfolder Mounting SMB Shares Using the mount Command To mount the SMB share, use the mount command with the -t cifs option, specifying the SMB protocol. Create a directory to serve as the mount point: sudo mkdir /mnt/smb_share Mount the SMB share using the following command: sudo mount -t cifs -o username=your_username,password=your_password //192.0.2.17/SharedFiles /mnt/smb_share Replace your_username and your_password with your actual username and password. Ensure /mnt/smb_share is an existing directory. Verifying the Mount To confirm that the SMB share is successfully mounted, use the mount command: mount -t cifs Navigate to the mount point and list the files: cd /mnt/smb_sharels Creating a Credentials File To avoid entering credentials each time, create a credentials file. This file should be hidden and secured. Use a text editor to create the file: nano ~/.smbcredentials Add the following content, replacing with your actual credentials: username=your_usernamepassword=your_password Set appropriate permissions for the file: sudo chown your_username: ~/.smbcredentialssudo chmod 600 ~/.smbcredentials Mount Using the Credentials File Mount the SMB share using the credentials file: sudo mount -t cifs -o credentials=~/.smbcredentials //192.168.2.12/SharedFiles /mnt/smb_share Automating SMB Share Mounts To automate the mounting process, add an entry to the /etc/fstab file. This will ensure the SMB share is mounted at boot. 1. Open /etc/fstab for editing: sudo nano /etc/fstab 2. Add the following line: //smbserver.example.com/sharedfolder /mnt/smbshare cifs username=johndoe,password=securepassword,iocharset=utf8,sec=ntlm 0 0 3. Save and close the file. 4. Test the fstab entry: sudo mount -a Ensure no errors are displayed. Troubleshooting Common Issues Permission Denied Check your credentials and permissions on the SMB server. No Such File or Directory Ensure the server IP, share path, and mount point are correct. Mount Error 13 = Permission Denied Double-check your username and password. Mount Error 112 = Host is Down Verify network connectivity and server availability. Unmounting an SMB Share To unmount the SMB share, use the umount command followed by the mount point: sudo umount /mnt/smb_share Conclusion Mounting an SMB share in Linux is a straightforward process that enhances file sharing capabilities across different operating systems. By following this tutorial, you can efficiently set up and troubleshoot SMB share mounts, facilitating seamless network communication and file access. Don't forget to check how to configure server image on Lunix! Frequently Asked Questions What is Samba in Linux and how does it relate to SMB? Samba is an open-source implementation of the SMB/CIFS protocol in Linux. It allows Linux systems to share files and printers with Windows devices over a network. What is the command to mount a Windows share in Linux? Use mount -t cifs //server/share /mnt/share -o username=your_user. How can I auto-mount an SMB share on boot in Linux? Add the mount configuration to /etc/fstab using proper credentials. Do I need root access to mount an SMB share? For traditional mounting, yes. But user-space tools like gio mount can be used without root.
16 June 2025 · 4 min to read
Linux

How to Create a Text File in Linux Terminal

In Linux, you can access and edit text files using a text editor that is designed to work with plain text. These files are not specifically coded or formatted. Linux allows one to create a file in numerous ways. The fastest is, probably, Linux Command Line or Terminal. For all users—especially server administrators—who must rapidly generate text files, scripts, or configuration files for their work, this is a very important ability. Let's proceed to the guide on four standard techniques for creating a text file on the terminal. Don't forget that Hostman offers a reliable managed Linux VPS for your projects. Prerequisites for File Creation in Linux Ensure these prerequisites are met before generating files in a Linux environment using the command-line interface: Access to a Functional Linux System: You must either have a Linux-based operating system installed on your computer or secure access to a Linux server via SSH (Secure Shell) protocol. Operational Terminal Interface: Confirm that your terminal application is accessible and fully operational. The terminal serves as your primary gateway to executing commands. Adequate User Permissions: Verify you can create files within the chosen directory. You may need to use sudo (for directories with access restrictions) to escalate privileges. Fundamental Commands Proficiency: You must get familiar with essential commands, such as touch for file creation, echo for printing text, cat for viewing file contents, and text editors like nano, vim, or vi for editing files directly. Text Editing Utilities: Ensure your system includes text editing tools: nano for command line simplicity, vim for advanced configurations, or graphical options like gedit for user-friendly navigation. Directory Management Expertise: Develop familiarity with directory navigation commands like cd for changing the working directory and ls for listing directory contents. This knowledge streamlines your workflow and avoids potential errors. Using the touch Command Generally, we use the touch command to create empty files and change timestamps. It will create an empty file if it doesn't exist already.  To create a text file in the current directory with the touch command: Open your terminal emulator. Type the command: touch filename.txt Change "filename" to your desired name. The timestamps for access and modification will be updated without changes in file content if the file exists already. Otherwise, an empty file is created with a given name.  Press Enter—if it is successful, there will be no output. Use the ls command to list the directory content and verify file creation. Using the echo Command Redirection The echo command is widely used to display text on the terminal. But its capabilities go beyond that; it may also be used to write content to a file or create an empty file. For this, combine the echo command with double redirect symbols (you can also use a single >) and the desired filename. A text file can be created by redirecting the output of the echo command to a file. See how it works: Open your terminal emulator. Type the command: echo “Your text content here” > filename.txt Replace the text in double quotations (do not delete them) with yours to add it to the file.  After you press Enter, your text will be added to the file filename.txt. It will overwrite an existing file, if there is one. Otherwise, it will just create a new one. Press Enter. To verify that the file has been created and contains the desired content, use cat command to display the content.  Using the cat Command Redirection In Linux, the cat command is mostly used to concatenate and show file contents. It can, however, also be used to generate a text document by redirecting the standard output of cat to a file. Open your terminal emulator. Type the following command: cat > filename.txt Replace filename.txt with the name for your text file. This command instructs cat to receive input rom the terminal and to redirect it into the filename.txt. Press Enter. The terminal will be waiting for input.  Enter the text you want in the file. Press Enter after each line. Press Ctrl + D when you are done. This signals the end of input to the cat and saves the content.  Run the cat command to check that the file has been created and contains the desired content. Start using Hostman efficient S3 storage Using printf for Advanced File Creation The printf utility is a powerful alternative to echo, offering enhanced formatting options for structuring text. It allows users to create files with precisely formatted content. Open the terminal. Use printf to define the text layout, incorporating formatting elements like newlines (\n) or tabs (\t). Redirect the output to a file using the > operator. Example: printf "First Line\nSecond Line\nIndented\tThird Line\n" >  formatted_file.txt Run the cat command to inspect the file's content and ensure the formatting matches expectations. Append Without Overwriting: To add content to an existing file without overwriting its current data, replace > with the append operator >>: printf "Additional content here.\n" >> formatted_file.txt Using a Text Dditor You can also create new files in linux text editors. There is always at least one integrated command-line text editor in your Linux distribution. But you can choose and install a different one according to your preferences, for example, Vim, Nano, or Emacs. Each of them has its own features and advantages. Vim vim, which stands for "Vi IMproved," is a very flexible and adaptable text editor. It is well-known for its modal editing, which allows for distinct modes for various functions like text entry, navigation, and editing. It allows split windows, multiple buffers, syntax highlighting, and a large selection of plugins for extra features. To create a text file using vim, follow the steps below: Open vim, with the desired filename as an argument. Press i to switch to Insert mode. Start typing and editing the filename.txt.  To save and exit, press Esc to ensure that command mode is running. Type: wq (write and quit) and press Enter. Nano nano is ideal for short adjustments and straightforward text files because it is lightweight and requires little setup. It provides support for basic text manipulation functions, search and replace, and syntax highlighting. To create a text file using nano, follow the steps below:  Run nano with the desired filename as an argument. It will open a new buffer for editing the file filename.txt. Start typing and editing the filename.txt.  To save and exit, press Ctrl + O to write the file, confirm the filename, and then press Ctrl + X to exit Nano. Emacs emacs is a powerful and flexible text editor that supports syntax highlighting, multiple buffers, split windows, and integration with external tools and programming languages. To create a text file using emacs, follow the steps below:  Open emacs, with the desired filename as an argument. Start typing and editing the filename.txt.  To save and exit, press Ctrl + X, followed by Ctrl + S to save the file, and then Ctrl + X, followed by Ctrl + C to exit Emacs. Note: If a message states that "VIM command not found", "nano command not found" or "emacs command not found" in Linux, it typically means that the vim, nano or emacs text editor is not installed on the system, or it's not included in the PATH environment variable, which is a list of directories where the operating system looks for executable files. To resolve this, install the text editor first using the command:  apt-get install vim apt-get install nano  apt-get install emacs Gedit An intuitive text editor that supports working with plain text and has syntax highlighting for programming languages. A straightforward graphical interface makes it usable for various tasks, from quick edits to complex document preparation. Open the Gedit Application: Launch Gedit either through the applications menu or by executing the following command in the terminal: gedit example.txt Gedit will create a new file if the specified one does not exist. Input Your Text: Type or paste your desired content into the editor. Save the File: Save your work with Ctrl + S or select File > Save. If creating a new file, specify a filename and a location. Verify: Return to the terminal and confirm the file exists with the ls command or review its content with cat. Linux File Creation Recommendations Ensure you have sufficient permissions to create files in the target directory. If they are insufficient, consider working in a directory where you have full rights (or elevate privileges with sudo). Check if a file with the identical name is already present before using the > operator, as the command will overwrite existing content. To prevent data loss, opt for the append operator >>. Familiarize yourself with the printf, echo, and text editors like vim or nano. These tools will help you reduce errors when working with files in Linux, as well as boost productivity. Use printf for creating files requiring structured content, such as configuration files or scripts with precise formatting needs. Conclusion Now you have acquainted yourself with the fundamental skill of creating a file in Linux using the terminal! Using the Linux command line, several fast and efficient methods exist to create and manage text files. Apply several techniques to meet a different requirement using the touch, echo, cat, printf commands, or text editors like vim, nano, gedit, or emacs. Users can select the method that sufficiently meets their requirements, such as creating empty files, appending text, or significantly modifying material. In summary, any of these methods enable Linux users to easily and quickly handle text files straight from the command line.
01 June 2025 · 8 min to read
Linux

How to Check OS Version in Linux

The popularity of the powerful and versatile Linux operating system lies in the variety of available versions. From Ubuntu to Red Hat, from Mint to Fedora, each Linux version offers users unique features and benefits. Hostman offers a reliable managed Linux VPS. It is important to check Linux OS version for compatibility, as varied versions have different software requirements. Using an older version may not allow you to install and run the latest software updates. Some hardware components may not be supported by certain Linux versions. Knowing your OS version can help you troubleshoot any compatibility issues. Therefore, it is important to check the Linux OS version and know which one you're using.  Knowing your OS version in Linux is obligatory for security reasons. All operating systems release updates to address security vulnerabilities, and Linux is no exception. If you know your OS version, you can be sure that the necessary security updates are installed. This is especially important for businesses and organizations dealing with confidential information and requiring strong security control. Another reason for checking Linux OS version is for support purposes. Various versions differentiate by support lifecycles. They have limited time to receive updates and support from developers. Knowing your OS version gives you an idea of ​​when it needs to be updated. An unsupported Linux version can leave your system vulnerable to security threats and compatibility issues. What is a Linux Version A Linux version, commonly termed a distro or distribution, is a customized version of the Linux operating system. It comes with a tailored mix of software, desktop environments, and functionalities. These distributions are custom-made to meet the varied needs and desires of their users. This comprises everything from individual PC users to huge corporations. Linux's open-source nature and flexibility enable various people and organizations to create and modify these distributions to meet specific needs. For example: Distributions such as Ubuntu, Debian, and Linux Mint are pretty useful for beginners because they offer user-friendly interfaces, extensive documentation, and a strong community network. Advanced distributions like Arch Linux grant unparalleled customization and autonomy, ideal for users who prefer crafting their systems from the ground up. Server-oriented distributions like CentOS and Red Hat Enterprise Linux (RHEL) are engineered for reliability, security, and top-tier performance, making them perfect for enterprise environments and critical applications. Specialized distributions like Kali Linux for security testing and Tails for anonymity are designed for specific purposes. A typical Linux distribution includes the Linux kernel (which controls hardware), a package manager (for installing and updating applications), and a set of default applications. The desktop environment (like GNOME, XFCE, or KDE) can be tailored in appearance and functionality to align with user preferences. Popular Linux distributions and their versions It’s important to check the Linux OS version as the operating system offers a large selection of distributions, each with its own unique features and characteristics. Common forms include Ubuntu, Debian, Red Hat, CentOS, Fedora and Mint. Ubuntu is famous for its user-friendly interface and regular updates. Debian is known for its strict adherence to free software principles. Red Hat Enterprise Linux (RHEL) offers a stable and secure platform for businesses. CentOS provides similar features to users for free. Fedora is distinguished by its frequent updates and use of the latest software. Mint features a more traditional desktop environment. Each version differs in software, desktop environment, and support lifecycle. Each distribution has various versions or releases with different code names and updates. Ubuntu has editions such as Bionic Beaver, Cosmic Cuttlefish and Disco Dingo, while Fedora has editions such as Silverblue and Workstation. They satisfy different needs and preferences of a wide range of users. Each Linux distribution has its own unique version numbering system, because it is an open-source operating system developed and maintained by a community of developers. Therefore, each distribution has its own set of developers who make decisions about naming and numbering their releases. Users can easily determine which version they are using and what changes have been made since the last update, and developers can track their progress and plan future releases.  Typically a three-level version numbering system with numbers separated by dots is used. The first number is a major release for updates or changes to the distribution, the second number is a minor release for bug fixes, security updates, and minor feature additions, the third number is a hotfix release for minor bug fixes and updates. Ubuntu uses a version numbering system in the format 'XX.YY.ZZ', where the first number is a year, the second is a month of release, and the third number is incremented with each new release that month. The system displays the age of release and frequency of updates. Code names, such as names of animals or cities, are also used to recognize releases of Linux distributions. Fedora uses code names for its releases like 'Bordeaux' and 'Heisenbug' to make it easier for users to navigate the different versions. There are many ways to find out the version of the Linux operating system and get distribution information about it. We’ll cover the most commonly used. Read on to learn how to check OS version in Linux. How to check the Linux OS version through the 'lsb_release' command You can apply the lsb_release command to check the Linux OS version. You’ll receive detailed information about the distribution, release, and codename of your operating system. To start, open the terminal; Type the command: lsb_release -a Press Enter to view a list of information displayed in your terminal. The Distributor ID line is a name of your Linux distribution, for instance, Ubuntu, Fedora, or CentOS. The Description line is a brief description of your Linux distribution with details such as the release number and the codename of your system. The Release line is a display of the specific version of your Linux distribution, such as '18.04' for Ubuntu or a name like 'Bionic Beaver.' The Codename line is your system’s codename assigned to each version of a Linux distribution, such as 'Bionic Beaver' for Ubuntu 18.04. How to check the OS version in Linux through the 'cat /etc/os-release' command You can apply the cat /etc/os-release command to check the OS version in Linux. It will help you quickly determine your OS version and show detailed information. To start, open the terminal;  Type the command: cat /etc/os-release Press Enter to view a list of information displayed on your terminal. The ID field is the name of your Linux distribution, such as Ubuntu or CentOS. The VERSION_ID field is the specific version of that distribution, such as Ubuntu 18.04 or CentOS 7. The cat /etc/os-release command shows other useful information about your operating system, such as the name and version of the operating system kernel, the desktop environment or window manager you are using, and the OS build and release date. How to check version of OS in Linux through the 'uname -a' command You can apply the uname -a command to check the Linux OS version. It displays detailed information about your system's kernel version, architecture, processor type, hostname, and even the date and time of the last system boot. To start, open the terminal;  Type the command: uname -a Press Enter to view a list of information displayed on your terminal. The output typically includes the Linux operating system kernel version and system architecture to ensure that you download and install the correct version of the software, avoiding compatibility issues and potential bugs. The command also provides information about the last time the system booted for analyzing system performance and identifying potential problems. Other ways to check OS version in Linux The hostnamectl command This is a new way to check the Linux OS version, available on systems using systemd. It provides more detailed data than previous methods, including kernel version, architecture, and hardware platform. To get the output, open the terminal;  Type the command: hostnamectl Press Enter to view a list of information displayed on your terminal. The /etc/os-release file The /etc directory contains configuration files and scripts used by the system, including the os-release file with information about the OS version To get the output, open the terminal and enter the command: cat /etc/os-release The /etc/issue file This file with system information is used for login prompts as well as for checking the OS version in Linux. To get the output, enter the command: cat /etc/issue The name and version of the operating system are displayed here. The version file Some Linux distributions have a version file in the /etc directory with information about the distribution and version. To get the output, open the terminal and enter the command: cat /etc/version The distribution name and version number are displayed here. How to Check Linux OS Version Using GUI This operating system has several ways to check your OS version. We have already explored the common methods through the command line interface. Now let’s learn how to check the Linux OS version without command. This is where the graphical user interface (GUI) comes into play, offering a convenient way to access system information. You need to access the system settings: To start, click on the 'Activities' button on the top-left corner of the screen; Enter 'system' in the search bar; Navigate to the 'System Settings' window and click the 'Details' option to display the OS name, version, and other system information in a new window. Checking the OS version in any Linux distribution is similar and differs slightly only in names of the buttons or windows in the search bar:   In Ubuntu click on the 'Activities' button and type 'System Settings' in the search bar, then navigate to the 'Details' tab. In Fedora click on the 'Show Applications' button and type 'Settings' in the search bar, then navigate to the 'About' tab. In CentOS click on the 'Applications' button and navigate to 'System Tools' and then 'Settings', then navigate to the 'System' tab. Checking the OS Version in Linux FAQ Let's go over a few frequently asked questions about Linux OS versions. Why is it vital to check the OS version in Linux? Verifying the OS version in Linux is essential for ensuring compatibility, maintaining security, and accessing support. Each version has distinct software prerequisites, life cycle durations, and security patches. How often should I check my Linux OS version? Consistently verifying your OS version is crucial, especially before adding new software or updates. This practice keeps your system current and secure. What are some of the widely recognized Linux distributions? Some widely recognized Linux distributions are Ubuntu, Debian, Kali Linux, Raspberry Pi, CentOS, Fedora, and Linux Mint. Each one boasts unique features designed to cater to the diverse needs of its user base. Can I check the Linux OS version using a GUI? Yes, you can check the Linux OS version via the GUI by heading to the system settings and locating the 'Details' or 'About' section, depending on your particular distribution. Why do various Linux distributions have unique version numbering systems? Each Linux distribution is developed and maintained by a different community or organization. Consequently, they all have unique version numbering systems to monitor progress and schedule future releases. For instance, Ubuntu's version number format is 'XX.YY.ZZ', where 'XX' denotes the year, 'YY' indicates the month of release, and 'ZZ' increments with each new release within that month. Conclusion Linux OS versions vary in underlying architecture, package management system, desktop environment, security features, compatibility, and release cycles. Each version has its own unique set of features and benefits, so users can choose the one that best suits their needs and preferences. Understanding your Linux OS version helps you in troubleshooting and solving problems, providing a better insight into the system's capabilities and limitations, allowing you to make informed decisions when it comes to upgrading or modifying the system. Now you have learned the different methods on how to check OS version in Linux through special commands or using GUI. Choose the best way for yourself and use it. Regularly checking and updating your Linux OS version is a good practice to ensure productive and hassle-free operation of your computer. This ensures that the system is running the latest version and all necessary security protocols are installed. If you're already found out your Linux version, don't forget to check how to create a server image on Linux.
30 May 2025 · 11 min to read

Do you have questions,
comments, or concerns?

Our professionals are available to assist you at any moment,
whether you need help or are just unsure of where to start.
Email us
Hostman's Support