SSH configuration file

From Alliance Doc
Revision as of 19:02, 11 May 2023 by Mboisson (talk | contribs)
Jump to navigation Jump to search

Parent page: SSH

On Linux and macOS you can modify your local SSH configuration file to change the default behaviour of ssh and simplify the login procedure. For example, if you want to login to narval.computecanada.ca as username using a SSH key you may need to use the following command:

Question.png
[name@yourLaptop ~] ssh -i ~/.ssh/your_private_key username@narval.computecanada.ca

To avoid having to type this command each time you want to connect to Narval, add the following to ~/.ssh/config on your local machine:

 Host narval
   User username
   HostName narval.computecanada.ca
   IdentityFile ~/.ssh/your_private_key

You can now log into Narval by typing

Question.png
[name@yourLaptop ~] ssh narval

This also changes the behaviour of sftp, scp, and rsync and you can now transfer files by typing for example

Question.png
[name@yourLaptop ~] scp local_file narval:work/

If you frequently log into different clusters, modify the above Host block as follows instead of adding individual entries for each cluster separately:

 Host narval beluga graham cedar
   [...]
   HostName %h.computecanada.ca
   [...]

Note that you need to install your public SSH key on each cluster separately or use CCDB.

Note that other options of the ssh commands have corresponding parameters that you can put in your ~/.ssh/config file on your machine. In particular, the command line options

  • -X (X11 forwarding)
  • -Y (trusted X11 forwarding)*
  • -A (agent forwarding)

can be set through your configuration file by adding lines with

  • ForwardX11 yes
  • ForwardX11Trusted yes
  • ForwardAgent yes

in the corresponding sections of your configuration file. Note however that we do not recommend doing so in general. Enabling X11 forwarding by default for all of your connection can slow down your sessions, especially if your X11 client on your computer is misconfigured.

Similarly, while forwarding your SSH agent is convenient, and is more secure than typing a password on a remote computer, it still comes with a risk. Should the server to which you are connecting to be compromised, a privileged user (root) could use your agent and connect to another host without your knowledge. That is why we recommend to use agent forwarding only when you need it. We also recommend that if you use this feature, you should combine it with ssh-askpass, so that any use of your SSH agent triggers a prompt on your computer, preventing usage of your agent without your knowledge.