Version Control with Git: SSH Key Setup

Before we can connect to a remote repository we need to set up a way for our computer to authenticate with the host of the remote repository so it knows it’s us trying to connect.

The host might be, for example, GitHub, or a GitLab server.

We are going to set up the method that is commonly used by many different services to authenticate access on the command line. This method is called Secure Shell Protocol (SSH). SSH is a cryptographic network protocol that allows secure communication between computers using an otherwise insecure network.

SSH uses what is called a key pair. This is two keys that work together to validate access. One key is publicly known and called the public key, and the other key called the private key is kept private. Very descriptive names.

You can think of the public key as a padlock, and only you have the key (the private key) to open it. You use the public key where you want a secure method of communication, such as your GitHub account. You give this padlock, or public key, to GitHub and say “lock the communications to my account with this so that only computers that have my private key can unlock communications and send git commands as my GitHub account.”

What we will do now is the minimum required to set up the SSH keys and add the public key to a GitHub account.

The first thing we are going to do is check if this has already been done on the computer you’re on. Because generally speaking, this setup only needs to happen once and then you can forget about it.

Keeping your keys secure

You shouldn’t really forget about your SSH keys, since they keep your account secure. It’s good practice to audit your secure shell keys every so often. Especially if you are using multiple computers to access your account.

We will run the list command to check what key pairs already exist on your computer.

ls -al ~/.ssh

Your output is going to look a little different depending on whether or not SSH has ever been set up on the computer you are using.

If you have not not set up SSH on your computer, the output of that command output is

ls: cannot access '/your/home/directory/.ssh': No such file or directory

If SSH has been set up on the computer you’re using, the public and private key pairs will be listed. The file names are either id_ed25519/id_ed25519.pub or id_rsa/id_rsa.pub depending on how the key pairs were set up.
If a key pair does not exist, do proceed with the following.

1. Create an SSH key pair

To create an SSH key pair use this command, where the -t option specifies which type of algorithm to use:

$ ssh-keygen -t ed25519

If you are using a legacy system that doesn’t support the Ed25519 algorithm, use: ssh-keygen -t rsa -b 4096

Generating public/private ed25519 key pair.
Enter file in which to save the key (/your/home/directory/.ssh/id_ed25519):

We want to use the default file, so just press Enter.

Created directory '/your/home/directory/.ssh'.
Enter passphrase (empty for no passphrase):

Now, it is prompting us for a passphrase.
It is good practice to set up a passphrase. Be sure to use something memorable or save your passphrase somewhere, as there is no “reset my password” option (you would have to delete the key and repeat this process):

Enter same passphrase again:

After entering the same passphrase a second time, we receive the confirmation

Your identification has been saved in /your/home/directory/.ssh/id_ed25519
Your public key has been saved in /your/home/directory/.ssh/id_ed25519.pub
The key fingerprint is:
SHA256:SMSPIStNyA00KPxuYu94KpZgRAYjgt9g4BA4kFy3g1o username@machine
The key's randomart image is:
+--[ED25519 256]--+
|^B== o.          |
|%*=.*.+          |
|+=.E =.+         |
| .=.+.o..        |
|....  . S        |
|.+ o             |
|+ =              |
|.o.o             |
|oo+.             |
+----[SHA256]-----+

The “identification” is actually the private key. You should never share it. The public key is appropriately named.
The “key fingerprint” is a shorter version of a public key.

Now that we have generated the SSH keys, we will find the SSH files when we check.

ls -al ~/.ssh
drwxr-xr-x 1 user group 197121   0 Jul 16 14:48 ./
drwxr-xr-x 1 user group 197121   0 Jul 16 14:48 ../
-rw-r--r-- 1 user group 197121 419 Jul 16 14:48 id_ed25519
-rw-r--r-- 1 user group 197121 106 Jul 16 14:48 id_ed25519.pub

2. Copy the public key to your GitHub account

This step assumes that you have already a GitHub account configured.

But I’m not working with GitHub!

The following steps are pretty similar also for other “Git Forges”, like GitLab and BitBucket. Now that you you have a SSH key pair, you need to copy the content of the public key file into a form in your account management interface (usually under something that looks like “Settings/SSH keys”)

Now we have a SSH key pair and we can run this command to check if GitHub can read our authentication.

First, we need to copy the public key.
Be sure to include the .pub at the end, otherwise you’re looking at the private key.

cat ~/.ssh/id_ed25519.pub
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDmRA3d51X0uu9wXek559gfn6UFNF69yZjChyBIU2qKI username@machine

Now, going to GitHub.com:

  1. click on your profile icon in the top right corner to get the drop-down menu
  2. On the drop-down menu, click “Settings”
  3. On the settings page, click “SSH and GPG keys” in the “Access” section of the menu on the left.
  4. Click the green “New SSH key” button on the right side.
  5. Now, you can add a short description (e.g., “Laptop”, or “Lab”) in the “Title” field, so we can remember where the original key pair files are located,
  6. Paste your SSH public key into the “Key” field
  7. Click the “Add SSH key” to complete the setup.

Now that we’ve set that up, let’s check our authentication from the command line.

ssh -T git@github.com
The authenticity of host 'github.com (192.30.255.112)' can't be established.
RSA key fingerprint is SHA256:nThbg6kXUpJWGl7E1IGOCspRomTxdCARLviKw6E5SY8.
This key is not known by any other names
Are you sure you want to continue connecting (yes/no/[fingerprint])? y

If it is the first time we connect to GitHub via SSH, it will ask us to if we trust the host to be the right one. We type in yes as we have no reason not to believe this:

Please type 'yes', 'no' or the fingerprint: yes
Warning: Permanently added 'github.com' (RSA) to the list of known hosts.
Hi user! You've successfully authenticated, but GitHub does not provide shell access.

Good! This output confirms that the SSH key works as intended. We are now ready to push our work to the remote repository.

Troubleshooting

I get “Permission denied”

git@github.com: Permission denied (publickey).

Make sure you copied the your ssh public key to GitHub.