Go to the github site of the project and copy the links for the hbbs and hbbr server.
For version 1.1.10-3 that would be
https://github.com/rustdesk/rustdesk-server/releases/download/1.1.10-3/rustdesk-server-hbbr_1.1.10-3_amd64.deb
and
https://github.com/rustdesk/rustdesk-server/releases/download/1.1.10-3/rustdesk-server-hbbs_1.1.10-3_amd64.deb.
On the Debian Linux server download the packages:
wget https://github.com/rustdesk/rustdesk-server/releases/download/1.1.10-3/rustdesk-server-hbbr_1.1.10-3_amd64.deb wget https://github.com/rustdesk/rustdesk-server/releases/download/1.1.10-3/rustdesk-server-hbbs_1.1.10-3_amd64.deb
apt install -f ./rustdesk-server-hbbs_1.1.10-3_amd64.deb apt install -f ./rustdesk-server-hbbr_1.1.10-3_amd64.deb
This will already start the two servers
in /lib/systemd/system/rustdesk-hbbs.service
change the line
ExecStart=/usr/bin/hbbs
to
ExecStart=/usr/bin/hbbs -r ip-address.or.DNS-name.of.your.server -k _
And to enforce the use of an encrypted connection, change in /lib/systemd/system/rustdesk-hbbr.service
the line
ExecStart=/usr/bin/hbbr
to
ExecStart=/usr/bin/hbbr -k _
Then refresh the serviced cache and restart the servers
systemctl daemon-reload systemctl restart rustdesk-hbbr.service systemctl restart rustdesk-hbbs.service
The public key was generated at first start in /var/lib/rustdesk-server/id_ed25519.pub
.
The content of that file is the required key in the client setup.
Should the key be compromised (known by unauthorized persons), just delete /var/lib/rustdesk-server/id_ed25519
and /var/lib/rustdesk-server/id_ed25519.pub
and restart hbbs. That will recreate new keys.