[07] DOES SDF SUPPORT SSH AUTHORIZED_KEYS FOR AUTHENTICATION?
Yes, to set this up on a Unix system, please follow the steps below.
Windows users might want to read about PuTTY Key Generator instead.
1. Run 'ssh-keygen -t rsa' on your host (the machine you plan to login
from). This will create a public key "id_rsa.pub" and private key
"id_rsa" under $HOME/.ssh . You have the option of protecting your
private key with a password, in the event that the $HOME directory
on your host is ever breached.
(Note: other types of keys, like DSA and ED25519, are not known to
work at present.)
2. Log in to SDF, and put the contents of your newly-created *.pub key
in the file $HOME/.ssh/authorized_keys (create it if it does not
already exist).
3. Set the appropriate permissions on $HOME/.ssh
(Run 'chmod -R 700 $HOME/.ssh' so that group and world on SDF
cannot read the directory).
4. Return to the machine you plan to login from, and create the file
$HOME/.ssh/config containing the following stanza. Replace ${LOGNAME}
with your SDF username.
Host tty.sdf.org
Hostname tty.sdf.org
PreferredAuthentications publickey,keyboard-interactive,password
IdentitiesOnly yes
IdentityFile ~/.ssh/id_rsa
User ${LOGNAME}
You should now be able to login via ssh without being prompted for a
password (unless you password-protected your private key, in which case
you will be prompted for the password by your ssh client).