{"id":9020,"date":"2025-01-24T20:13:00","date_gmt":"2025-01-24T20:13:00","guid":{"rendered":"https:\/\/www.hostragons.com\/?p=9020"},"modified":"2025-03-17T11:32:56","modified_gmt":"2025-03-17T11:32:56","slug":"%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3","status":"publish","type":"post","link":"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/","title":{"rendered":"\u062d\u0630\u0641 \u06a9\u0644\u06cc\u062f SSH \u0644\u06cc\u0646\u0648\u06a9\u0633: \u0647\u0645\u0647 \u0631\u0648\u0634 \u0647\u0627 \u0648 \u0646\u06a9\u0627\u062a"},"content":{"rendered":"<h2><span class=\"ez-toc-section\" id=\"Giris\"><\/span><strong>Giri\u015f<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7erik Haritas\u0131<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#Giris\" >Giri\u015f<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#1_SSH_Key_Nedir_ve_Neden_Kaldirma_Gerekebilir\" >1. SSH Key Nedir ve Neden Kald\u0131rma Gerekebilir?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#2_SSH_Anahtarini_Silmek_Icin_Temel_Adimlar\" >2. SSH Anahtar\u0131n\u0131 Silmek \u0130\u00e7in Temel Ad\u0131mlar<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#21_Yerel_Anahtari_Silme\" >2.1 Yerel Anahtar\u0131 Silme<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#22_Uzak_Sunucudaki_Anahtari_Kaldirma\" >2.2 Uzak Sunucudaki Anahtar\u0131 Kald\u0131rma<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#23_Ozel_Bir_Yontem_ssh-copy-id_ile_Ters_Islem\" >2.3 \u00d6zel Bir Y\u00f6ntem: ssh-copy-id ile Ters \u0130\u015flem<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#3_Linux_SSH_Key_Kaldirmanin_Avantaj_ve_Dezavantajlari\" >3. Linux SSH Key Kald\u0131rman\u0131n Avantaj ve Dezavantajlar\u0131<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#31_Avantajlar\" >3.1 Avantajlar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#32_Dezavantajlar\" >3.2 Dezavantajlar<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#4_Alternatif_veya_Ek_Metotlar\" >4. Alternatif veya Ek Metotlar<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#41_Passphrase_Guncellemeleri\" >4.1 Passphrase G\u00fcncellemeleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#42_Key_Revocation_List_KRL\" >4.2 Key Revocation List (KRL)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#43_SSH_Konfigurasyon_Dosyasi_ile_Engelleme\" >4.3 SSH Konfig\u00fcrasyon Dosyas\u0131 ile Engelleme<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#5_Somut_Ornekler_ve_Ipuclari\" >5. Somut \u00d6rnekler ve \u0130pu\u00e7lar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#6_Dis_ve_Ic_Baglantilar\" >6. D\u0131\u015f ve \u0130\u00e7 Ba\u011flant\u0131lar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#7_Ozet_ve_Sonuc\" >7. \u00d6zet ve Sonu\u00e7<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#Sikca_Sorulan_Sorular_SSS\" >S\u0131k\u00e7a Sorulan Sorular (SSS)<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#1_Linux_SSH_Key_Kaldirma_islemi_icin_sistemde_oturum_acik_olmasi_gerekiyor_mu\" >1. Linux SSH Key Kald\u0131rma i\u015flemi i\u00e7in sistemde oturum a\u00e7\u0131k olmas\u0131 gerekiyor mu?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#2_SSH_Key_silmenin_ardindan_yeniden_baglanmak_icin_ne_yapmam_gerekiyor\" >2. SSH Key silmenin ard\u0131ndan yeniden ba\u011flanmak i\u00e7in ne yapmam gerekiyor?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.hostragons.com\/fa\/%d9%88%d8%a8%d9%84%d8%a7%da%af\/%d8%ad%d8%b0%d9%81-%da%a9%d9%84%db%8c%d8%af-ssh-%d9%84%db%8c%d9%86%d9%88%da%a9%d8%b3\/#3_Birden_fazla_sunucuda_ayni_anahtari_kullaniyorum_hepsinden_kaldirmali_miyim\" >3. Birden fazla sunucuda ayn\u0131 anahtar\u0131 kullan\u0131yorum, hepsinden kald\u0131rmal\u0131 m\u0131y\u0131m?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<p><strong>Linux SSH Key Kald\u0131rma<\/strong> i\u015flemi, \u00f6zellikle <strong>SSH anahtar\u0131n\u0131 silmek<\/strong> veya de\u011fi\u015ftirmek istedi\u011fimizde ba\u015fvurabilece\u011fimiz kritik bir ad\u0131md\u0131r. SSH ba\u011flant\u0131lar\u0131m\u0131z\u0131n g\u00fcvenli\u011fini art\u0131rmak ya da yeni bir <strong>SSH g\u00fcvenlik yap\u0131land\u0131rmas\u0131<\/strong> s\u00fcrecine ge\u00e7mek i\u00e7in anahtarlar\u0131 iptal etmek isteyebiliriz. Bu yaz\u0131da, SSH key silme s\u00fcrecinin hangi y\u00f6ntemlerle ger\u00e7ekle\u015ftirilebilece\u011fini, hangi avantaj ve dezavantajlar\u0131 bar\u0131nd\u0131rd\u0131\u011f\u0131n\u0131 ve olas\u0131 alternatif \u00e7\u00f6z\u00fcmleri ele alaca\u011f\u0131z. Ayr\u0131ca \u00f6rnek uygulamalarla i\u015flemleri peki\u015ftirecek, son k\u0131s\u0131mda da s\u0131k\u00e7a sorulan sorulara yan\u0131t verece\u011fiz.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"1_SSH_Key_Nedir_ve_Neden_Kaldirma_Gerekebilir\"><\/span>1. SSH Key Nedir ve Neden Kald\u0131rma Gerekebilir?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SSH (Secure Shell), uzak sunuculara g\u00fcvenli ba\u011flant\u0131 yapmay\u0131 sa\u011flayan bir protokol ve ara\u00e7 setidir. \u201cAnahtar tabanl\u0131 kimlik do\u011frulama\u201d y\u00f6ntemi ise g\u00fcvenli ve pratik bir kullan\u0131m sunar. \u015eu durumlardaysa Linux SSH Key Kald\u0131rma i\u015flemi gerekebilir:<\/p>\n<ul>\n<li><strong>G\u00fcvenlik<\/strong>: Anahtar\u0131n\u0131z\u0131n s\u0131zd\u0131r\u0131ld\u0131\u011f\u0131ndan veya eskimi\u015f algoritmalarla olu\u015fturuldu\u011fundan endi\u015fe ediyorsan\u0131z.<\/li>\n<li><strong>Kullan\u0131c\u0131 De\u011fi\u015fikli\u011fi<\/strong>: Sunucuyu devretme, ekibinize yeni bir \u00fcye kat\u0131lmas\u0131 veya projeden ayr\u0131lan bir uzman\u0131n eri\u015fiminin iptali gibi durumlar.<\/li>\n<li><strong>Yeni Yap\u0131land\u0131rma<\/strong>: Daha g\u00fc\u00e7l\u00fc algoritmalar (\u00f6r. Ed25519) veya farkl\u0131 <strong>SSH g\u00fcvenlik yap\u0131land\u0131rmas\u0131<\/strong> i\u00e7in anahtarlar\u0131 yeniden olu\u015fturmak.<\/li>\n<\/ul>\n<p>SSH key kald\u0131rma i\u015flemi, sadece riskli durumlar i\u00e7in de\u011fil, d\u00fczenli g\u00fcvenlik politikalar\u0131n\u0131n bir par\u00e7as\u0131 olarak da tercih edilebilir. Kullan\u0131lmayan veya gereksiz hale gelmi\u015f anahtarlar\u0131 silmek, olas\u0131 siber sald\u0131r\u0131 vekt\u00f6rlerini azalt\u0131r.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"2_SSH_Anahtarini_Silmek_Icin_Temel_Adimlar\"><\/span>2. SSH Anahtar\u0131n\u0131 Silmek \u0130\u00e7in Temel Ad\u0131mlar<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>SSH anahtar\u0131n\u0131 silmek<\/strong> veya iptal etmek i\u00e7in genellikle iki farkl\u0131 noktaya bakmak gerekir:<\/p>\n<ol>\n<li><strong>Yerel Makinedeki Anahtarlar\u0131n Silinmesi<\/strong>: \u00c7o\u011funlukla <code>~\/.ssh\/<\/code> dizinindeki \u00f6zel (<em>private<\/em>) ve ortak (<em>public<\/em>) anahtarlar\u0131n kald\u0131r\u0131lmas\u0131.<\/li>\n<li><strong>Uzak Sunucudaki Kay\u0131tl\u0131 Anahtarlar\u0131n Silinmesi<\/strong>: Sunucu taraf\u0131nda <code>~\/.ssh\/authorized_keys<\/code> dosyas\u0131nda yer alan sat\u0131rlar\u0131n temizlenmesi.<\/li>\n<\/ol>\n<p>Bu iki i\u015flemin senkronize olarak yap\u0131lmas\u0131 gerekir. Yerel anahtar\u0131n\u0131z\u0131 silseniz bile sunucudaki bilgiler duruyorsa, bir sald\u0131rgan sunucu taraf\u0131ndakini ele ge\u00e7irdi\u011fi takdirde h\u00e2l\u00e2 risk olu\u015fturabilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"21_Yerel_Anahtari_Silme\"><\/span>2.1 Yerel Anahtar\u0131 Silme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Linux veya macOS sistemlerde, SSH anahtar \u00e7iftleri genelde <code>~\/.ssh<\/code> klas\u00f6r\u00fcnde bulunur. \u00d6rnekler:<\/p>\n<ul>\n<li><code>~\/.ssh\/id_rsa<\/code> (\u00d6zel Anahtar)<\/li>\n<li><code>~\/.ssh\/id_rsa.pub<\/code> (Ortak Anahtar)<\/li>\n<li><code>~\/.ssh\/id_ed25519<\/code> (\u00d6zel Anahtar)<\/li>\n<li><code>~\/.ssh\/id_ed25519.pub<\/code> (Ortak Anahtar)<\/li>\n<\/ul>\n<p>Silerken dikkatli olmak gerekir. E\u011fer isimlendirme \u00f6zel bir adla yap\u0131lm\u0131\u015fsa (<code>mycustomkey<\/code> vb.), do\u011fru dosyalar\u0131 tespit etmelisiniz. Komut \u00f6rne\u011fi \u015fu \u015fekildedir:<\/p>\n<pre><code>cd ~\/.ssh\/\r\nrm id_rsa id_rsa.pub\r\n# veya\r\nrm id_ed25519 id_ed25519.pub\r\n<\/code><\/pre>\n<p>Yeni bir proje i\u00e7in ya da farkl\u0131 bir kullan\u0131c\u0131yla \u00e7al\u0131\u015fmaya ge\u00e7ecekseniz, bu dosyalar\u0131 silmeniz yeterli. Ancak tek bir sunucuda birden fazla anahtarla \u00e7al\u0131\u015f\u0131yorsan\u0131z yanl\u0131\u015f dosyay\u0131 silmemek i\u00e7in dikkatli olmal\u0131s\u0131n\u0131z.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9218 aligncenter\" src=\"https:\/\/www.hostragons.com\/wp-content\/uploads\/2025\/01\/ssh-key-kaldirma-ekrani.jpg\" alt=\"linux ssh key kald\u0131rma \u00f6rnek ekran g\u00f6r\u00fcnt\u00fcs\u00fc\" width=\"876\" height=\"429\" title=\"\" srcset=\"https:\/\/www.hostragons.com\/wp-content\/uploads\/2025\/01\/ssh-key-kaldirma-ekrani.jpg 876w, https:\/\/www.hostragons.com\/wp-content\/uploads\/2025\/01\/ssh-key-kaldirma-ekrani-768x376.jpg 768w, https:\/\/www.hostragons.com\/wp-content\/uploads\/2025\/01\/ssh-key-kaldirma-ekrani-18x9.jpg 18w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/p>\n<h3><span class=\"ez-toc-section\" id=\"22_Uzak_Sunucudaki_Anahtari_Kaldirma\"><\/span>2.2 Uzak Sunucudaki Anahtar\u0131 Kald\u0131rma<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Sunucu \u00fczerinden Linux SSH Key Kald\u0131rma ad\u0131m\u0131na ge\u00e7erken, uzak makinede ba\u011fland\u0131\u011f\u0131n\u0131z kullan\u0131c\u0131n\u0131n <code>~\/.ssh\/authorized_keys<\/code> dosyas\u0131nda kay\u0131tl\u0131 sat\u0131r\u0131 silmeniz gerekir. A\u015fa\u011f\u0131daki gibi bir i\u015flem uygulayabilirsiniz:<\/p>\n<pre><code># Sunucuya giri\u015f yap\u0131n.\r\nssh [email protected]\r\n\r\n# Ard\u0131ndan kendi home dizininize gidip authorized_keys dosyas\u0131n\u0131 a\u00e7\u0131n\r\nnano ~\/.ssh\/authorized_keys\r\n\r\n# Silmek istedi\u011finiz sat\u0131r\u0131 bulun ve kald\u0131r\u0131n.\r\n<\/code><\/pre>\n<p>\u00d6rne\u011fin, <em>id_rsa.pub<\/em> i\u00e7eri\u011fi uzun bir sat\u0131r olarak <code>authorized_keys<\/code> i\u00e7inde g\u00f6z\u00fck\u00fcr. Bu sat\u0131r\u0131 ya da sat\u0131rlar\u0131 tespit edin ve tamamen silin. Kaydedip \u00e7\u0131kt\u0131\u011f\u0131n\u0131zda, o anahtar\u0131n sunucuya eri\u015fim izni iptal edilmi\u015f olur.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"23_Ozel_Bir_Yontem_ssh-copy-id_ile_Ters_Islem\"><\/span>2.3 \u00d6zel Bir Y\u00f6ntem: <code>ssh-copy-id<\/code> ile Ters \u0130\u015flem<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong>ssh-copy-id<\/strong>, genellikle anahtar eklemek i\u00e7in kullan\u0131l\u0131r. Lakin \u201ckald\u0131rma\u201d opsiyonu yerle\u015fik olarak yoktur. Yine de <code>ssh-copy-id<\/code> ile eklenen anahtarlar, <code>authorized_keys<\/code> dosyas\u0131ndaki belirli sat\u0131rlarla e\u015fle\u015fti\u011fi i\u00e7in, bu sat\u0131rlar\u0131 manuel bi\u00e7imde silme gereklidir. Yani do\u011frudan <code>ssh-copy-id -r<\/code> gibi bir komutla silme i\u015flemi desteklenmez. Bu y\u00fczden ya edit\u00f6rle ya da betik haz\u0131rlayarak authorized_keys temizleyebilirsiniz.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"3_Linux_SSH_Key_Kaldirmanin_Avantaj_ve_Dezavantajlari\"><\/span>3. Linux SSH Key Kald\u0131rman\u0131n Avantaj ve Dezavantajlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Bir i\u015flemi uygulamadan \u00f6nce art\u0131 ve eksi y\u00f6nlerini tartmak, olas\u0131 sorunlar\u0131 engellemeye yard\u0131mc\u0131 olur. \u0130\u015fte anahtar silme s\u00fcrecinin avantaj ve dezavantajlar\u0131:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"31_Avantajlar\"><\/span>3.1 Avantajlar<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>G\u00fcvenlik Art\u0131\u015f\u0131<\/strong>: Kullan\u0131lmayan veya ele ge\u00e7irme ihtimali bulunan eski anahtarlar\u0131 iptal ederek olas\u0131 sald\u0131r\u0131 y\u00fczeyini k\u00fc\u00e7\u00fclt\u00fcrs\u00fcn\u00fcz.<\/li>\n<li><strong>Temiz Y\u00f6netim<\/strong>: Ekip i\u00e7indeki ayr\u0131lan ki\u015filerin eri\u015fimini kolayca sonland\u0131r\u0131rs\u0131n\u0131z. Bu da y\u00f6netilebilirli\u011fi art\u0131r\u0131r.<\/li>\n<li><strong>D\u00fczenli G\u00fcncelleme<\/strong>: D\u00fczenli silme ve yeniden olu\u015fturma, s\u00fcrekli modern \u015fifreleme algoritmalar\u0131 kullanman\u0131z\u0131 sa\u011flayabilir.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"32_Dezavantajlar\"><\/span>3.2 Dezavantajlar<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><strong>Yanl\u0131\u015f Anahtar Silme<\/strong>: Yanl\u0131\u015f dosyay\u0131 veya sat\u0131r\u0131 silmek, sistemlere eri\u015fiminizi kaybetmenize yol a\u00e7abilir.<\/li>\n<li><strong>Ge\u00e7ici Eri\u015fim Kayb\u0131<\/strong>: Operasyon s\u0131ras\u0131nda tecr\u00fcbesiz kullan\u0131c\u0131lar, yeniden ba\u011flant\u0131 sa\u011flamakta zorlanabilir.<\/li>\n<li><strong>\u0130\u015f G\u00fcc\u00fc Maliyeti<\/strong>: \u00c7ok say\u0131da sunucu veya kullan\u0131c\u0131 i\u00e7in bu i\u015flemi y\u00f6netmek vakit alabilir.<\/li>\n<\/ul>\n<p>Dolay\u0131s\u0131yla, avantajlar\u0131n yan\u0131 s\u0131ra beklenmedik riskleri de g\u00f6z \u00f6n\u00fcne almal\u0131, i\u015flemleri planl\u0131 ve dikkatli bi\u00e7imde uygulamal\u0131s\u0131n\u0131z.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"4_Alternatif_veya_Ek_Metotlar\"><\/span>4. Alternatif veya Ek Metotlar<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SSH anahtarlar\u0131n\u0131 kald\u0131rman\u0131n yan\u0131 s\u0131ra farkl\u0131 yakla\u015f\u0131mlar da bulunuyor. Bu b\u00f6l\u00fcm\u00fc g\u00f6zden ge\u00e7irmek, baz\u0131 \u00f6zel senaryolarda avantaj sa\u011flayabilir:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"41_Passphrase_Guncellemeleri\"><\/span>4.1 Passphrase G\u00fcncellemeleri<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E\u011fer <strong>SSH g\u00fcvenlik yap\u0131land\u0131rmas\u0131<\/strong> temelinde sadece anahtar \u015fifresini de\u011fi\u015ftirmek istiyorsan\u0131z, <code>ssh-keygen -p<\/code> komutuyla passphrase yenilenebilir. Bu, anahtar\u0131 tamamen silmeye gerek kalmadan g\u00fcvenlik seviyesini y\u00fckseltir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"42_Key_Revocation_List_KRL\"><\/span>4.2 Key Revocation List (KRL)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>OpenSSH 6.2 ve \u00fczeri s\u00fcr\u00fcmlerde, <em>Key Revocation List<\/em> (KRL) \u00f6zelli\u011fi mevcuttur. Yani sunucuda, hangi anahtarlar\u0131n ge\u00e7ersiz oldu\u011funa ya da hangi sertifikalar\u0131n kabul edilmeyece\u011fine dair bir liste tutabilirsiniz. <code>ssh-keygen -k -f revoked_keys<\/code> gibi komutlarla KRL olu\u015fturulup, SSH da buna g\u00f6re konfig\u00fcre edilebilir.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"43_SSH_Konfigurasyon_Dosyasi_ile_Engelleme\"><\/span>4.3 SSH Konfig\u00fcrasyon Dosyas\u0131 ile Engelleme<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Sunucu taraf\u0131nda, <code>\/etc\/ssh\/sshd_config<\/code> i\u00e7inde baz\u0131 parametrelerle kullan\u0131c\u0131 ya da belirli anahtar tipleri engellenebilir. \u00d6rne\u011fin <code>PasswordAuthentication no<\/code> gibi ayarlarla sadece anahtar tabanl\u0131 eri\u015fime izin verip, istenirse DMZ veya test sistemleri i\u00e7in farkl\u0131 politikalar olu\u015fturabilirsiniz. Fakat bu, \u201canahtar\u0131 silmek\u201d yerine genel eri\u015fim protokol\u00fcn\u00fc de\u011fi\u015ftiren bir y\u00f6ntemdir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"5_Somut_Ornekler_ve_Ipuclari\"><\/span>5. Somut \u00d6rnekler ve \u0130pu\u00e7lar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Uygulamada nas\u0131l ilerleyece\u011finizle ilgili birka\u00e7 \u00f6rnek \u00fczerinden gidelim:<\/p>\n<ol>\n<li><strong>Geli\u015ftirme Ekibi \u00d6rne\u011fi<\/strong>: 5 ki\u015filik bir ekibiniz var. Ayr\u0131lan bir ki\u015fi i\u00e7in <code>authorized_keys<\/code> dosyas\u0131ndan sadece onun sat\u0131r\u0131n\u0131 silmek yeterli olabilir. Ek olarak, o ki\u015finin yerel makinesindeki <em>private key<\/em> de silinmelidir.<\/li>\n<li><strong>Sunucu Devri<\/strong>: Altyap\u0131 de\u011fi\u015ftirilirken, eski sunucudaki t\u00fcm SSH anahtarlar\u0131n\u0131 iptal edip, yeni sunucunuzda sadece g\u00fcncel anahtarlar\u0131 kullan\u0131rs\u0131n\u0131z. Bu sayede devre d\u0131\u015f\u0131 b\u0131rak\u0131lan sistemlerin a\u00e7\u0131klar\u0131 tekrar canlanmam\u0131\u015f olur.<\/li>\n<li><strong>Acil Durum Senaryosu<\/strong>: Bir anahtar\u0131n s\u0131zd\u0131r\u0131ld\u0131\u011f\u0131 veya \u00e7al\u0131nd\u0131\u011f\u0131 \u015f\u00fcphesi varsa, vakit kaybetmeden <strong>Linux SSH Key Kald\u0131rma<\/strong> yaparak yetkisiz eri\u015fimin \u00f6n\u00fcne ge\u00e7ebilirsiniz. Ard\u0131ndan yeni bir anahtar olu\u015fturup ekleyerek sisteminize ba\u011flanabilirsiniz.<\/li>\n<\/ol>\n<p>Bu \u00f6rnekler, farkl\u0131 \u00f6l\u00e7eklerde ve durumlarda key kald\u0131rma karar\u0131n\u0131n ne kadar hayati olabilece\u011fini g\u00f6steriyor.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"6_Dis_ve_Ic_Baglantilar\"><\/span>6. D\u0131\u015f ve \u0130\u00e7 Ba\u011flant\u0131lar<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>SSH ile ilgili daha kapsaml\u0131 bilgilere ihtiyac\u0131n\u0131z varsa <a href=\"https:\/\/www.openssh.com\/\" target=\"_blank\" rel=\"noopener\">OpenSSH Resmi Sitesi<\/a> (DoFollow) \u00fczerinden t\u00fcm dok\u00fcmantasyona ula\u015fabilirsiniz.<\/p>\n<p>Ayr\u0131ca, sitemizde yer alan <a href=\"\/etiket\/linux\/\">Linux<\/a>\u00a0kategorimiz alt\u0131nda, farkl\u0131 konfig\u00fcrasyon \u00f6rneklerine de g\u00f6z atabilirsiniz.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"7_Ozet_ve_Sonuc\"><\/span>7. \u00d6zet ve Sonu\u00e7<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Linux SSH Key Kald\u0131rma<\/strong>, g\u00fcvenlik ve y\u00f6netilebilirlik a\u00e7\u0131s\u0131ndan olmazsa olmaz ad\u0131mlardan biridir. G\u00fcvenlik ihlalleri, ekip de\u011fi\u015fiklikleri ya da sadece d\u00fczen sa\u011flamak gibi sebeplerden \u00f6t\u00fcr\u00fc <strong>SSH anahtar\u0131n\u0131 silmek<\/strong> isteyebilirsiniz. \u0130\u015flem temel olarak iki a\u015famadan olu\u015fur: Yereldeki anahtarlar\u0131n\u0131z\u0131 temizlemek ve sunucu taraf\u0131ndaki <code>authorized_keys<\/code> dosyas\u0131nda ilgili sat\u0131rlar\u0131 kald\u0131rmak.<\/p>\n<p>Bu a\u015famada dikkatli davranman\u0131z, <strong>SSH g\u00fcvenlik yap\u0131land\u0131rmas\u0131<\/strong> s\u00fcre\u00e7lerinizi yaz\u0131l\u0131 bir politika ile y\u00f6netmeniz ve ekip i\u00e7i koordinasyonu sa\u011flaman\u0131z tavsiye edilir. G\u00fcncel kriptografik y\u00f6ntemlerini kullanmak, periyodik kontrol yapmak ve kullan\u0131lmayan anahtarlar\u0131 devre d\u0131\u015f\u0131 b\u0131rakmak, siber sald\u0131r\u0131lara kar\u015f\u0131 \u00f6nemli bir kalkan olu\u015fturur. Unutmay\u0131n, k\u00fc\u00e7\u00fck bir ihmal, b\u00fcy\u00fck bir veri ihlaline kap\u0131 aralayabilir.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Sikca_Sorulan_Sorular_SSS\"><\/span>S\u0131k\u00e7a Sorulan Sorular (SSS)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"1_Linux_SSH_Key_Kaldirma_islemi_icin_sistemde_oturum_acik_olmasi_gerekiyor_mu\"><\/span>1. Linux SSH Key Kald\u0131rma i\u015flemi i\u00e7in sistemde oturum a\u00e7\u0131k olmas\u0131 gerekiyor mu?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Genellikle evet. <strong>SSH anahtar\u0131n\u0131 silmek<\/strong> i\u00e7in sunucuya eri\u015fiminiz olmas\u0131 gerekir. Oturum a\u00e7\u0131ksa <code>authorized_keys<\/code> dosyas\u0131n\u0131 d\u00fczenleyebilir, yerelde ise <code>~\/.ssh<\/code> klas\u00f6r\u00fcn\u00fczdeki dosyalar\u0131 silebilirsiniz. Ancak i\u015flem s\u0131ras\u0131nda farkl\u0131 bir y\u00f6ntemle (\u00f6rne\u011fin root konsolu) de eri\u015fiminiz varsa, oturum a\u00e7madan da d\u00fczenleme yapabilirsiniz.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"2_SSH_Key_silmenin_ardindan_yeniden_baglanmak_icin_ne_yapmam_gerekiyor\"><\/span>2. SSH Key silmenin ard\u0131ndan yeniden ba\u011flanmak i\u00e7in ne yapmam gerekiyor?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Eski anahtar\u0131 sildiyseniz, art\u0131k o anahtarla ba\u011flant\u0131 m\u00fcmk\u00fcn olmaz. Yeni bir <strong>SSH g\u00fcvenlik yap\u0131land\u0131rmas\u0131<\/strong> planl\u0131yorsan\u0131z, <em>ssh-keygen<\/em> komutuyla yeni anahtarlar olu\u015fturmal\u0131 ve sunucudaki <code>authorized_keys<\/code> dosyas\u0131na public key\u2019i eklemelisiniz.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_Birden_fazla_sunucuda_ayni_anahtari_kullaniyorum_hepsinden_kaldirmali_miyim\"><\/span>3. Birden fazla sunucuda ayn\u0131 anahtar\u0131 kullan\u0131yorum, hepsinden kald\u0131rmal\u0131 m\u0131y\u0131m?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>E\u011fer anahtar\u0131 tamamen devre d\u0131\u015f\u0131 b\u0131rakmak istiyorsan\u0131z evet, t\u00fcm sunuculardaki <code>authorized_keys<\/code> kay\u0131tlar\u0131n\u0131 da silmeniz gerekir. Aksi takdirde farkl\u0131 sunuculara hala eri\u015fim sa\u011flanabilir.<\/p>\n<p><!-- \u00d6rnek G\u00f6rseller: A\u015fa\u011f\u0131daki img etiketlerini ihtiyaca g\u00f6re d\u00fczenleyebilirsiniz. Alt etiketler i\u00e7erisinde odak anahtar kelimeler yer al\u0131yor. --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Giri\u015f Linux SSH Key Kald\u0131rma i\u015flemi, \u00f6zellikle SSH anahtar\u0131n\u0131 silmek veya de\u011fi\u015ftirmek istedi\u011fimizde ba\u015fvurabilece\u011fimiz kritik bir ad\u0131md\u0131r. SSH ba\u011flant\u0131lar\u0131m\u0131z\u0131n g\u00fcvenli\u011fini art\u0131rmak ya da yeni bir SSH g\u00fcvenlik yap\u0131land\u0131rmas\u0131 s\u00fcrecine ge\u00e7mek i\u00e7in anahtarlar\u0131 iptal etmek isteyebiliriz. Bu yaz\u0131da, SSH key silme s\u00fcrecinin hangi y\u00f6ntemlerle ger\u00e7ekle\u015ftirilebilece\u011fini, hangi avantaj ve dezavantajlar\u0131 bar\u0131nd\u0131rd\u0131\u011f\u0131n\u0131 ve olas\u0131 alternatif \u00e7\u00f6z\u00fcmleri ele alaca\u011f\u0131z. [&hellip;]<\/p>\n","protected":false},"author":94,"featured_media":9216,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"googlesitekit_rrm_CAow5YvFDA:productID":"","footnotes":""},"categories":[413],"tags":[443,441,440,442],"class_list":["post-9020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nedir-nasil-yapilir","tag-linux","tag-linux-ssh-key","tag-ssh-key","tag-ssh-key-kaldirma"],"_links":{"self":[{"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/posts\/9020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/comments?post=9020"}],"version-history":[{"count":0,"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/posts\/9020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/media\/9216"}],"wp:attachment":[{"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/media?parent=9020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/categories?post=9020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostragons.com\/fa\/wp-json\/wp\/v2\/tags?post=9020"}],"curies":[{"name":"\u0648\u0631\u062f\u067e\u0631\u0633","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}