mirror of
https://expo.survex.com/repositories/expoweb/.git/
synced 2024-12-12 11:32:23 +00:00
104 lines
7.4 KiB
HTML
104 lines
7.4 KiB
HTML
<!DOCTYPE html>
|
|
<html>
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<title>Key-Pair Setup (Expo handbook)</title>
|
|
<link rel="stylesheet" type="text/css" href="../../css/main2.css" />
|
|
</head>
|
|
<body>
|
|
<h2 id="tophead">CUCC Expedition Handbook</h2>
|
|
|
|
<h1>Key-Pair Setup</h1>
|
|
<p>As of the server move in spring 2019 you need authorisation on the expo server to log in. This takes the form of an ssh key. You generate a key-pair on the machine you use for access, then send the public half to the server. Once done all logins are automatic - no passwords needed.</p>
|
|
|
|
<p>'ssh' is 'secure shell' and is widely used for secure access to machines and services.</p>
|
|
|
|
<h2>What do I need to do?</h2>
|
|
<p>You will need to run ssh-keygen/PuTTYgen on your device, email the public key to someone who already has ssh access (Wookey, Paul Fox, Philip Sargent, Sam Wenham). Once installed by them you should be able to log in as 'expo' over ssh (and other software like git will also use this behind the scenes). This only needs doing once (for any machine you want access from).</p>
|
|
|
|
<p>Our own documentation for <a href="../putty/putty.html">installing PuTTy on Windows</a>.
|
|
|
|
<p>Explanation of <a href="https://www.ssh.com/ssh/keygen/">key-pairs and the ssh-keygen command</a>.</p>
|
|
|
|
<p>A public key file looks like this: <tt>ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEApc9+PAMrDtWa8D8/ZneLP2X9UOYmTITAhTd2DRs8SE+NDgis5pYo/Xhtbrg86ePMAC2YM5xAkYx3jNA/VZ/PkB3gTzYJW3T/zTH+cc7YeWhy9l1zIMaYqeyvw7FxeSBaR4XoLPVtVUlai8DUDiWAEm7VvOKj1n68z1LxVh1MZXLm7btckf6fske2YU9UpjqT++AURQvFheRJ4la7KBJ7LXZ3A/TQ7HQaTpqmcQKCiRj/yZ5FNHxBk0M+ShbHUtz1GhXRCMJ3LZHaw24OJyVJ8YNzBiStBb1qcWCXX7HR9CUNhz7tA5HZyc1lau/1vwk8MSe93lyyLntzJKkqmkW/cQ== wookey@kh</tt>i.e. a long string of characters with 'ssh-rsa' at the start and an ID at the end (often 'user'@'machine').</p>
|
|
|
|
<h3>Windows</h3>
|
|
<p>On a Windows machine use
|
|
<a href="https://www.ssh.com/ssh/putty/windows/puttygen">puttygen</a>, which is part of <a href="https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html">PuTTY</a>. You need to install that if you don't already have it.</p>
|
|
<p>Follow the Puttygen instructions, but the really short version is:
|
|
<li>Run PuTTYgen</li>
|
|
<li>Click on 'Generate'. Follow the instructions. Don't bother adding a passphrase.</li>
|
|
<li>Type your name in the 'Key comment' field. (just so we know who's key it is)</li>
|
|
<li>Save the private key (this will create a .ppk file that you will need later)</li>
|
|
<li>Don't save the public key - instead copy all of the text from the 'Public key for pasting
|
|
+into OPENSSH authorized_keys file' field, and paste that into the email. Make sure not to miss part or add newlines or otherwise mess with it.</li>
|
|
<li>Run Pageant (it will have been installed in your Start menu, otherwise find it it "C:\Program Files\PuTTY\pageant.exe"). Click the "Add Key" button. Select the .ppk file in the pop-up file list. You only need to do this once.
|
|
</ol>
|
|
|
|
<h3>Linux</h3>
|
|
<ol>
|
|
<li>You need openssh-client installed - it's it extremely likely to already be installed. If not (as root/with sudo) <tt>apt install openssh-client</tt>.</li>
|
|
<li>You may already have a key on this machine. If you already have <tt>~/.ssh/id_rsa.pub</tt>, then send that.</li>
|
|
<li>If not, run <tt>ssh-keygen</tt>. It may ask about passwords: you can add a password for extra
|
|
security, but a passwordless key is fine, and more convenient.</li>
|
|
<li>That will create a file: <tt>.ssh/id_rsa.pub</tt> in your home directory. Email that file to one of the admins listed above. </li>
|
|
|
|
</ol>
|
|
|
|
<h3>MacOS</h3>
|
|
|
|
<li>Erm, dunno...please fill in</li>
|
|
|
|
<h3>Android</h3>
|
|
<ul>
|
|
<li>Install the <a href="https://play.google.com/store/apps/details?id=com.server.auditor.ssh.client&hl=en">Termius app</a>
|
|
which is a ssh client. The free version does ssh but not sFTP. Follow the <a href="https://docs.termius.com/">Termius documentation</a> and in-app help to generate a key pair and then use the same process to upload the public key to the expo server as for Linux machines, i.e. email it to an admin.
|
|
</li>
|
|
</ul>
|
|
<h3>iOS</h3>
|
|
<ul>
|
|
<li>There is apparently a version of the <a href="https://play.google.com/store/apps/details?id=com.server.auditor.ssh.client&hl=en">Termius app</a>
|
|
for iPhones. Please try it out and document it here.
|
|
</ul>
|
|
|
|
|
|
|
|
<h2>Your second machine</h2>
|
|
<p>OK, you have an uploaded and usable key and you can ssh into the expo server. If you want to connect from another machine (e.g. your phone) it's better to make another key than try to re-use the first one. You don't need a nerd admin now, you can do this yourself. But be <b>extremely careful</b> to follow this exactly. If you innocently rename the files to something that appears more sensible it won't work.
|
|
<ol>
|
|
<li>On your new machine, generate a key-pair. Since you are probably using a different operating system on your second machine, read the instructions above for the relevant OS. Yes you will be generating a new key. Do not re-use the key you had already.
|
|
<li>This time though, you will want to be sure that the key has a meaningful label. On Linux this means something like this:
|
|
<tt> ssh-keygen -C "anathema.device@crowley"</tt>
|
|
(if your name is Anathema Device and your new machine is "crowley"). Just click through the questions it asks accepting the defaults. It will tell you what the key files are called and where it has put them.
|
|
<li>
|
|
If you accepted the defaults, the public key will be called <span style="font-family:monospace; size=x-small; background-color: lightgray">id_rsa.pub</span> and it will be in <span style="font-family:monospace; size=x-small; background-color: lightgray">~/.ssh/</span> - check that this is the case.
|
|
<li>Now copy the public key file to your <em>first machine</em>, the one that is already set up with a working key-pair setup with the expo server. Using email to yourself is easiest.
|
|
<li>Now upload the public key using sFTP (Filezilla configured to use sFTP, which uses Pageant by default) to <span style="font-family:monospace; size=x-small; background-color: lightgray">expo.survex.com/home/expo/.ssh/keys/</span>
|
|
<li>Now login to the expo server on your first machine and do these commands:<br />
|
|
Be <b>extremely careful</b> to type ">>" and not ">" in the fourth line below otherwise you will delete <i>everyone's</i> logins.
|
|
<tt><font color=red">$</font> ssh expo@expo.survex.com
|
|
<br /><font color=blue">expo@expo:~$</font> cd .ssh
|
|
<br /><font color=blue">expo@expo:~$</font> cp -p authorized_keys authorized_keys.backup
|
|
<br /><font color=blue">expo@expo:~/.ssh$</font> cat keys/id_rsa.pub >>authorized_keys
|
|
<br /><font color=blue">expo@expo:~/.ssh$</font> tail -n 1 authorized_keys
|
|
</tt>
|
|
This adds your key on to the end of the authorized keys list and prints the last line - which should be your key that you just added.
|
|
<li>Now your public key is installed for your second machine. You check that it works by logging into the expo server using ssh from your second machine: <em>ssh expo@expo.survex.com </em>.
|
|
</p>
|
|
<p>Note that by using sFTP like this we avoid having to use a text editor over ssh. If you know what you are doing you can do this of course, but the above process is less likely to cause problems for a Windows user setting up their phone as a second device where they are not experienced with vi or nano.
|
|
|
|
|
|
|
|
</ol>
|
|
<hr />
|
|
Return to <a href="basiclaptop.html">Setting up a basic laptop</a>
|
|
<div id="menu">
|
|
<ul id="links">
|
|
<li><a href="../index.htm">Handbook</a>
|
|
|
|
<li><a href="../../infodx.htm">Main index</a></li>
|
|
</ul>
|
|
</div>
|
|
</body>
|
|
</html>
|