ICPC Banner

How to Access an ICPC WF System Remotely

Credit for the original source for this article goes to John Buck, ICPC North America Greater New York Region

1. Overview

The ICPC World Finals OS image ("WF OS") does not allow remote access by default (that is, by default the only way to "login" to a machine running the WF OS is directly from the machine's console).

However, it is sometimes useful for Contest Administrators/Staff to be able to use remote access, e.g. ssh, for contest setup, configuration, and testing. This article discusses several topics related to remote access to the WF OS, including enabling password-based remote ssh logins, enabling ssh keypair logins, and arranging support for GUI-based remote desktop operations.

2. Enabling Password-Authenticated SSH Logins

By default, the ICPC WF image prohibits logging in remotely using ssh with user/password authentication. This is enforced using a custom sshd configuration file:

     /etc/ssh/sshd_config.d/icpc.conf

The settings specified in this file override the defaults that are in /etc/ssh/sshd_config. Specifically, /etc/ssh/sshd_config.d/icpc.conf contains the following line:

    PasswordAuthentication no

This line prevents remote logins that attempt to use password authentication.

The easiest way to enable user/password logins is to edit that file and simply comment out this line by adding the comment character '#' at the start of the line, thus:

    #PasswordAuthentication no

After editing and saving the file, simply restart the ssh daemon:

    systemctl restart sshd

You should now be able to log into the installation account (or any other account which has been created on the WF OS machine) using ssh from a remote system, using the password for that account.

Note that both editing the /etc/ssh/sshd_config.d/icpc.conf file and executing the systemctl command require "root" access, so these must be done while logged into the administrative account at the console (see the separate instructions on Installing the WF OS), and the commands must be preceded with sudo.

3. Using SSH Key-Pair Logins

A more secure (albeit more complicated) approach for allowing remote access to a WF OS machine is to provide support for ssh keys on the machine. This requires adding a public "ssh key" for each account to be enabled for such access. This is particularly useful (and more secure) in a contest environment where only system administrators should be allowed to log in remotely. This section describes various methods for generating such ssh keys, and explains how to install them into a WF OS system.

3.1 Creating SSH Key-Pairs

In order to use ssh key logins, you must first create an ssh key-pair. (The studious can check out this link for information on ssh key-pairs.)

There are three common use-cases for ssh keypairs:

  1. Using OpenSSH utilities (ssh/psftp/scp).
  2. Using Putty from Windows with an OpenSSH-generated key-pair.
  3. Using Putty from Windows using a Putty generated key-pair.
Each of these is discussed in the following subsections.
3.1.1. Using OpenSSH utilities

By default, most Linux systems use the OpenSSH utilities such as ssh, sftp, scp, etc. These utilities are able to make use of ssh key-pairs generated by the ssh-keygen utility. The ssh-keygen utility will generate private and public key files (comprising the so-called ssh key-pair). The private key file must be kept private (it is essentially your login credentials, and anyone that has it can log into any system where the public key is installed). The public key can be installed on any system that supports the OpenSSH utilities. (Note that there is no private information in the public key file.)

To generate a key-pair on an OpenSSH system, enter a command similar to the following:

    ssh-keygen -t ed25519 -f wfimg2023-ed25519 -C "My WF 2023 Key" -N ''

The -t option specifies the "signature" (basically, the encoding scheme) to be used for the generated keys.
The -f option allows you to choose the output file name(s); you can replace wfimg2023-ed25519 with any file name you want.
The -C option allows you to specify a comment that describes the key; this comment is visible in the public key file.
The -N option allows you to specify a "New passphrase"; the "empty string" (consecutive single-quotes) indicates that no passphrase is to be generated for the keypair.

After you execute the above command, two files will be created: the private key file: wfimg2023-ed25519 and the public key file: wfimg2023-ed25519.pub. Keep the private key file secure! You can move this file, along with the public key file, to your $HOME/.ssh folder, which is where most keys are stored. Here is the contents of the wfimg2023-ed25519.pub file generated by the above command:

    ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKdiBL6ACRF+xH9kBDwBOgfz9PK3w97QhWZwp3GNadHr My WF 2023 Key

Note the comment from the -C option at the end of the line.

To allow remote ssh access using your public key on a WF machine (or any OpenSSH machine), append the public key file to the ~/.ssh/authorized_keys file in any user's account. Once that line has been added to the authorized_keys file on a system, you can then use ssh to login to that user's account (without a password) by typing:

    ssh -i ~/.ssh/wfimg2023-ed25519 user@remote.host

(The example above assumes you appended your public key to the end of ~user/.ssh/authorized_keys on host system remote.host.)

3.1.2. Using PuTTY from Windows with an OpenSSH-generated key-pair

PuTTY (frequently just written "Putty") is a free, open-source SSH and Telnet client for Windows (Putty can be downloaded here). Putty supports the use of ssh keypairs, but since putty is not an OpenSSH utility, if you generate a keypair on an OpenSSH system you must then convert the private key to a key that Putty can use. There is a utility tool called puttygen which will do this. The puttygen utility is automatically included when you download the complete Putty system, or it can be installed separately from the same download page.

Once you have installed puttygen, follow these steps to convert an OpenSSH private key to a Putty-compatible private key:

  1. Transfer your private key file to your Windows system (make sure you don't put it in a public folder on your Windows system).
  2. Run the downloaded puttygen.exe utility.
  3. Click the "Load" button (Load an existing private key file).
  4. Navigate to the folder where you copied your private key.
  5. Change the "file types" entry from "PuTTY Private Key Files (*.ppk)" to "All FIles (*.*)" and select your private key file.
  6. Click the "Open" button to import the key.
  7. The key should be successfully imported (a message box will appear indicating this).
  8. Click "OK" to dismiss the message box.
  9. Click the "Save private key" button (Save the generated key).
  10. Answer "Yes" to the "Are you sure you want to save this key without a passphrase" (unless of course you want to add a passphrase - that is up to you).
  11. Browse to a non-public folder (normally the same folder to which you copied the private key file).
  12. Type the name of the file to save the key to and add the ".ppk" extension, e.g.: wf2023.ppk.
  13. Press the "Save" button.
  14. Close the puttygen.exe utility.

Once you have created the Putty-compatible private key, you must install it into Putty. To do this:

  1. Open Putty, and expand the "Connection->SSH->Auth->Credentials" node in the Putty tree.
  2. Click the Browse... button (next to the the "Private key file for authentication" box).
  3. Navigate to and select the ".ppk" file you created using puttygen.exe.
  4. Select the "Session" node in the Putty tree and enter the host/ip of the host you wish to connect to, then press the "Open" button.
  5. When you are prompted for the user name, enter it; this should log you in, automatically using the combination of the public key/private key pair to authenticate the login.

Note that the preceding presumes that you followed the earlier step of installing the OpenSSH public key in the authorized_keys file on the remote WF OS machine.

3.1.3. Using Putty from Windows with a Putty-generated key-pair

The preceding sections describe how to generate a public/private keypair on an OpenSSH system, and then how to use puttygen to convert the resulting private key so that Putty (running on a remote Windows machine) can use it to establish an ssh connection to a WF machine on which the corresponding OpenSSH public key has been installed.
An alternative is to use Putty to generate both the public and private keys, and then to transfer the Putty-generated OpenSSH-compatible public key to the WF machine (installing it in the appropriate authorized_keys file on that machine).

Generating a compatible public/private keypair is another function which can be done using the puttygen utility (see the previous section). The steps for using puttygen to generate a public/private keypair are as follows.

  1. Run the downloaded puttygen.exe utility.
  2. Toward the bottom of the window, under Parameters, for Type of key to generate, select: EdDSA.
  3. Choose the Generate button (Generate a public/private key pair)
  4. puttygen will ask you to move the mouse around in the window to generate some randomness for the key generation. The progress bar will advance indicating how much longer you have to move the mouse around.
  5. In the "Key" box, where it says: "Public key for pasting into OpenSSH authorized_keys file:", select the text in the box and right-click, copy it, and save it into a file. Make sure you select ALL the text in the box, as shown below. (Note: do not use the Save public key button to save the key; this saves the key in a Putty-specific format which is not compatible with OpenSSH systems.)

    Generating an OpenSSH key with PuttyGen

  6. Click the Save private key button (Save the generated private key).
  7. Answer "Yes" to the "Are you sure you want to save this key without a passphrase" (unless, of course you want to add a passphrase - that is up to you).
  8. Navigate to a non-public folder.
  9. Type the name of the file to save the key to, adding the ".ppk" extension to the filename, e.g.: wf2023.ppk.
  10. Press the Save button.
  11. Close the puttygen.exe utility.

Once you have created the Putty public and private keys, there are two final steps:

4. Using a Remote XWindows Server

A frequently useful thing to be able to do is to run GUI applications from your remote ssh session on your local desktop. If your remote system is another Linux-based system, then you can simply start an ssh session using X tunneling into the ICPC WF system with the -X option of ssh:

    ssh -X user@ip.address
where ip.address is the IP address (or hostname) of the system that is running the WF image.

If your remote system is a Windows-based system, you'll first have to install an X-server application on your Windows machine. One approach is to use Xming, a small-footprint Windows X-server application that is easy to set up and use and which allows you to run X-windows applications on your Windows desktop. (Any modern Windows-based X-server should work equally as well.)

Once you have an X-server running on your Windows machine, you need to configure a GUI-based ssh terminal application such as Putty (see above) to communicate via X-Windows with the remote WF OS machine. To configure Putty for X-Windows, under the Connection->SSH->X11 settings select "Enable X11 forwarding" as shown below:

Configuring Putty for X11

Be sure to go back to the "Session" settings and save the updated configuration if you want the configuration change to persist; then use the Open button to connect to the WF image system. This will open an X-windows terminal window on your machine. You can try it out by typing:

    xeyes &

The X11 "eyes" application should pop up on your Windows desktop. You can run Eclipse by typing:

    eclipse &

Note that some bigger applications such as Eclipse, CLion, Pycharm, etc. may take some time to load up remotely. Also, be sure to disable access control on Xming the first time you run it (there’s a check-box for doing that).


Revised: Sun Jan 1 02:19:46 UTC 2023