Using SSH Keys To Access HPG
Introduction
After a new account is created on HiPerGator (HPG) you, as the account's owner, can log in using your credentials (GatorLink username and password for UF users). Mis-typing the credentials several times will result in a security system block of the user's IP address and can be slow. For convenience and speed, it may be useful to set up a SSH key pair to use.
SSH key pair means there are two keys:
- A private key is stored in the
~/.ssh/
directory on the computer you are connecting from- The private key acts as the identity file (the key part of the lock/key mechanism).
- Use a good passphrase to protect the private key in case it is accessed by someone else
- Use an SSH agent to store it, so you only have to type the passphrase in once when starting the computer or the terminal application.
- A public key gets copied to every system you want to connect to and can be described as a specification for the 'lock' part of the lock/key ssh mechanism to allow the receiving computer connections to your account from a system that uses the private key part of the pair as its identify file.
The private key is not used automatically, although most systems are configured to use ~/.ssh/id_rsa by default. See how to configure your ssh setup to use the correct private key as the IdentityFile below.
SSH Configuration
Windows
See the following document that describes how to Create SSH keys on Windows.
Linux and MacOS
A convenient configuration for your ssh client on your local computer. The ControlPath
and following lines setup persistent connections so that you do not need to redo the MFA verification with every connection. Replace you username in the User
line.
Host hpg User albertgator HostName hpg.rc.ufl.edu Port 2222 ControlPath ~/.ssh/cm-%r@%l-%h:%p ControlMaster auto ControlPersist 8h
In all commands below you can now use 'hpg' instead of USER@hpg.rc.ufl.edu
Create SSH Keys
Note: You can also use a text editor (vi, nano, emacs, vscode) in a terminal or a console session in Open OnDemand to edit ~/.ssh/authorized_keys file.
Linux
For a modern ED25519 cipher based key pair
- Generate a key
ssh-keygen -o -a 100 -t ed25519 -f ~/.ssh/id_ed25519 -C "Comment to make the key recognizable among many"
- Add the following configuration at the top of the ~/.ssh/config file
Host * AddKeysToAgent yes IdentityFile ~/.ssh/id_ed25519
- Configure your account on HiPerGator to accept the key instead of the username/password. If you are already logged in you can manually edit the ~/.ssh/authorized_keys file and add the new public ssh key as a single new line or run the following command, if available, on the local computer you generated your key pair on:
(substitute your real username for 'USER')
ssh-copy-id -i ~/.ssh/id_ed25519 USER@hpg.rc.ufl.edu
For an RSA key pair
- ssh-keygen -o -t rsa -b 4096 -f ~/.ssh/id_rsa
ssh-add -K ~/.ssh/id_rsa
Edit ~/.ssh/config and add
Host * AddKeysToAgent yes IdentityFile ~/.ssh/id_rsa
- Configure your account on HiPerGator to accept the key instead of the username/password. If you are already logged in you can manually edit the ~/.ssh/authorized_keys file and add the new public ssh key as a single new line or run the following command, if available, on the local computer you generated your key pair on:
ssh-copy-id -i ~/.ssh/id_rsa USER@hpg.rc.ufl.edu
The default cipher for ssh keys is RSA. However, key length less than 4096 should not be used for better security.
MacOS
The procedure is mostly the same as on Linux when using either the built-in MacOS terminal application or iTerm2.
For a modern ED25519 cipher
- Generate a key
ssh-keygen -o -a 100 -t ed25519 -f ~/.ssh/id_ed25519 -C "Comment to make the key recognizable among many"
- Add the following configuration to ~/.ssh/config file
Host * AddKeysToAgent yes UseKeychain yes IdentityFile ~/.ssh/id_ed25519
For an RSA key
- ssh-keygen -o -t rsa -b 4096 -f ~/.ssh/id_rsa
ssh-add -K ~/.ssh/id_rsa
Edit ~/.ssh/config and add
Host * AddKeysToAgent yes UseKeychain yes IdentityFile ~/.ssh/id_rsa
- Configure your account on HiPerGator to accept the key instead of the username/password. If you are already logged in you can manually edit the ~/.ssh/authorized_keys file and add the new public ssh key as a single new line or run the following command, if available, on the local computer you generated your key pair on:
ssh-copy-id -i ~/.ssh/id_rsa USER@hpg.rc.ufl.edu