Using SSH Keys To Access HPG

From UFRC
Revision as of 16:06, 25 August 2022 by Moskalenko (talk | contribs) (→‎DRAFT)
Jump to navigation Jump to search

Introduction

After a new account is created on HiPerGator (HPG) you as the account's owner can log in using your GatorLink credentials (gatorlink username and password). However, mis-typing the credentials several times will result in a security system block of the user's IP address. For convenience and speed, especially when copying files between HPG and a remote computer system - whether it's a local computer you are connecting from or an external system - using scp or rsync tools or SFTP applications it may be useful to set up a SSH key pair to use instead of GatorLink credentials.

SSH key pair means there are two keys - a private key is stored in the ~/.ssh/ directory on the system you are connecting from and acts as the identity file (the key part of the lock/key mechanism). Use a good passphrase to protect the private key in case it's accessed by someone else and use an SSH agent to store it, so you only have to type the passphrase in once when starting the computer or the terminal application. A public key gets copied to every system you want to connect to and can be described as a specification for the 'lock' part of the lock/key ssh mechanism to allow the receiving computer connections to your account from a system that uses the private key part of the pair as its identify file.

The private key is not used automatically, although most systems are configured to use ~/.ssh/id_rsa by default. See how to configure your ssh setup to use the correct private key as the IdentityFile below.

Create SSH Keys

Linux

For a modern ED25519 cipher

  • Generate a key
ssh-keygen -o -a 100 -t ed25519 -f ~/.ssh/id_ed25519 -C "Comment to make the key recognizable among many"
  • Add the following configuration at the top of the ~/.ssh/config file
Host *
  AddKeysToAgent yes
  IdentityFile ~/.ssh/id_ed25519
  • Configure your account on HiPerGator to accept the key instead of the username/password. Substitute your real username for 'USER':
ssh-copy-id ~/.ssh/id_ed25519 USER@hpg.rc.ufl.edu

For an RSA key

  • ssh-keygen -o -t rsa -b 4096 -f ~/.ssh/id_rsa
ssh-add -K ~/.ssh/id_rsa

Edit ~/.ssh/config and add

Host *
  AddKeysToAgent yes
  IdentityFile ~/.ssh/id_rsa
  • Configure your account on HiPerGator to accept the key instead of the username/password. Substitute your real username for 'USER':
ssh-copy-id ~/.ssh/id_rsa USER@hpg.rc.ufl.edu

The default cipher for ssh keys is RSA. However, key length less than 4096 should not be used for better security.

MacOS

The procedure is mostly the same as on Linux when using either the built-in MacOS terminal application or iTerm2.

For a modern ED25519 cipher

  • Generate a key
ssh-keygen -o -a 100 -t ed25519 -f ~/.ssh/id_ed25519 -C "Comment to make the key recognizable among many"
  • Add the following configuration to ~/.ssh/config file
Host *
  AddKeysToAgent yes
  UseKeychain yes
  IdentityFile ~/.ssh/id_ed25519

For an RSA key

  • ssh-keygen -o -t rsa -b 4096 -f ~/.ssh/id_rsa
ssh-add -K ~/.ssh/id_rsa

Edit ~/.ssh/config and add

Host *
  AddKeysToAgent yes
  UseKeychain yes
  IdentityFile ~/.ssh/id_rsa
  • Configure your account on HiPerGator to accept the key instead of the username/password. Substitute your real username for 'USER':
ssh-copy-id ~/.ssh/id_rsa USER@hpg.rc.ufl.edu


Windows

See the following document that describes how to Create SSH keys on Windows.