This section uses the wiki's documentation conventions.
To initiate an SSH connection from a Mac/Linux system to the cluster's login (head) node, use the generic command
ssh
«options» «HPC_username»@«HPC_hostname»
For example,
ssh -Y traine@caviness.hpc.udel.edu
This ssh command is on your local system. This example assumes you have a local command line interface, and are running X-Windows, for example, Mac/UNIX/Linux or cygwin/X (with the openssh client).
The secure shell (SSH) is a network protocol to allow secure logins and file transfers to a remote host. On a PC it is frequently bundled with a terminal emulator, as a place to type commands on the remote host. Unix systems, include Mac, come with terminal emulator such as xterm, gnome-terminal or mac terminal. IT recommends you start with the built-in terminal application of you local system, and use the command line SSH tools. The three main tools are:
All of these commands use the hidden SSH directory to store identity keys, host keys and your configuration file. There are a few SSH command utilities to help you manage your SSH directory. The all begin with the ssh-
prefix.
The SSH commands are Unix commands and they use a hidden directory in your home directory ~/.ssh to store important files:
It is very important to have this directory and all the files permitted properly. Others should not be able to see your secret information (such as the private key). We suggest you let the SSH commands created the files as needed. If the file is not permitted properly, either it will be ignored or you will get an error message.
To connect to a remote host, you must first exchange identity keys. The remote host has a system level SSH directory /etc/ssh as well as the SSH directory in your home directory on the remote host. You must append the appropriate id keys to the end of the key lists - known hosts and authorized keys.
Key exchanges | |||||
---|---|---|---|---|---|
On Local Host | On Remote Host | ||||
~/.ssh/known_hosts | «— | /etc/ssh public key | |||
~/.ssh public key file | —» | ~/.ssh/authorized_keys |
There are SSH tools to help with the key exchange. When these tools work, you will not need to know the details of file names and directory locations.
We will map out a basic method for getting files in your hidden SSH directory. These SSH commands will create new directories and files, as needed, and tell you when new files are created. Commands to create a SSH directory with public/private keys, adding the keys to the SSH agent, and finally sending the public key to a remote SSH directory.
ssh-keygen
– to create public/private key pairssh-add
– to add public key to SSH agentssh-copy-id
account@remote_host – to copy public key to remote hostmodify your .ssh/config file
– optional step to create an SSH serviceRepeat the last two steps command for each remote host where you have an account with the home directory setup for ssh.
Second, you want to add your keys to your SSH agent.
ssh-add
Here is an example session output where you enter the same passphrase you entered above (twice).
[trainf@login00 ~]$ ssh-add Enter passphrase for /home/1200/.ssh/id_ecdsa: Identity added: /home/1200/.ssh/id_ecdsa (/home/1200/.ssh/id_ecdsa)
You can list the keys in your SSH agent with:
[trainf@login00 ~]$ ssh-add -l 2048 ba:b5:b6:0e:d9:71:f2:f9:9e:e7:17:39:57:6b:6b:d6 /home/1200/.ssh/id_ecdsa (RSA)
To connect to a remote you must know the key and have it stored in your known host file. The system will do this exchange automatically, the first time you try to connect.
[trainf@centos .ssh]$ ssh notme@caviness.hpc.udel.edu The authenticity of host 'caviness.hpc.udel.edu (128.175.98.19)' can't be established. RSA key fingerprint is 19:28:fd:da:66:48:f2:8b:e3:ca:80:7e:b1:ec:b0:2c. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'caviness.hpc.udel.edu,128.175.98.19' (RSA) to the list of known hosts.
Third, you want to copy the key in your SSH agent to a remote host. You need and account and password.
ssh-copy-id account@remote_host
ssh-copy-id
is not installed with all SSH tool sets. You will get
a "command not found" message with the above command. For example, it is not included on the Mac distribution.
For a one time copy of your id, after a local ssh-add, use the command:
ssh -A account@remote_host 'ssh-add -L >> .ssh/authorized_keys'
to append the keys in your agent to the end of your remote authorized keys file.
Or you can copy the relatively simple shell executable (and man page) from a host that does have it installed. Both Caviness and Farber have the script in /usr/bin/ssh-copy-id
and the man page in /usr/share/man/man1/ssh-copy-id.1.gx
.
Here is an example session using the ssh-copy-id command. Answer "yes", after you verify the host name. Then you will be asked for your password on the remote host.
[trainf@login00 ~]$ ssh-copy-id jdoe@centos.css.udel.edu The authenticity of host 'centos.css.udel.edu (128.175.68.83)' can't be established. RSA key fingerprint is d2:f9:58:79:08:d6:18:22:3f:23:ac:4b:f4:a7:b9:3b. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'centos.css.udel.edu,128.175.68.83' (RSA) to the list of known hosts. jdoe@centos.css.udel.edu's password: Now try logging into the machine, with "ssh 'jdoe@centos.css.udel.edu'", and check in: .ssh/authorized_keys to make sure we haven't added extra keys that you weren't expecting.
In this case, you have "permanently added" the host name to your list of known hosts, and you have added
keys to your remote .ssh/authorized_keys
file (one key per line).
Check the file permissions and dates with commands:
ls -dl .ssh .ssh/* ssh jdoe@centos.css.udel.edu 'ls -dl .ssh .ssh/*'
An SSH service is a short cut that is saved you ssh configuration file. Collect this information for each service you want to add:
Short name | Account name | Full server name | Options you want to add | ||||
---|---|---|---|---|---|---|---|
caviness | trainf | caviness.hpc.udel.edu | Trusted X11 tunnelling & arcfour ciphers | ||||
vm | jdoe | centos.css.udel.edu | no password authentication |
For these two services add these lines to your .ssh/config
file
Host caviness User trainf Hostname caviness.hpc.udel.edu ForwardX11 yes ForwardX11Trusted yes Ciphers arcfour256,arcfour128 Host vm User jdoe Hostname centos.css.udel.edu PasswordAuthentication no
With these lines in your .ssh/config
file, you can logon with the command:
ssh caviness
and you can copy files from you current local directory to your remote home directory with the command:
scp localfile.txt caviness:remotefile.txt