If you are a scientist conducting research or analysing experiment results, you'll require access to the production environment here at the LIC. Access to the production environment is via SSH.
Since the production systems house our most sensitive data, password authentication is disabled. The only form of authentication enabled is key-based.
In the past, the LIC has experienced a breach by way of insecure ssh key pair generation. Therefore, we have developed a state-of-the-art RSA key pair generation system. The system is completely offline and "air gapped." In order to prevent persistent malware or other attacks, we've based our system on a microcontroller with no multi-user operating system. This reduces the risk of accidentally installing malicious packages that could steal private keys or backdoor the generation of keys. This custom system boots into a known-good state each time it performs a key-pair generation. If an attacker does somehow gain access, they will be unable to persist on the device.
The system is connected to the production environment via a serial connection to a production host. The key generator securely sends your public key to the production systems. The system has a secondary serial connection to a host on the workstation network. Your private key will be placed on your workstation with the correct permissions to ensure it is not accidentally disclosed.
Please test your access. The machine hosting this documentation gets a copy of your public key and places it here. It has the same name as your username (only with a .pub extension).
There is also an ssh server running on this host on port 2222. To ensure your private key was generated and placed correctly, you should ssh to this machine on that port from your workstation using your key.