With SSH, data transmissions between TinyTERM and the server are encrypted. Even
if someone manages to hack into your connection, the information won't be
readable. This helps protect your valuable information from unauthorized access.
SSH keys provide an additional layer of security for your server. With password
access disabled, brute-force attempts to login to the server will fail, as only an
authorized key pair will allow a login.
The SSH Files tab allows you to specify an existing SSH
Configuration Location and SSH Public Key file already on the
Mac. To select one or the other, click the appropriate Locate button.
Browse the Finder window to select the file. You can also choose to Use system
SSH Authorization Daemon if it is already configured.
To generate a new SSH key pair, go to the SSH Keys tab.
RSA v2 or DSA encryption to match your host requirements. Set the
Key Size to the preferred number of bits. The larger the
key size, the longer it will take to generate.
TinyTERM also requires a Passphrase to be used with the key. This
does not need to be an actual password for the server, so it can include spaces,
punctuation or any other characters desired.
On clicking the Generate button, TinyTERM will generate the keys
in the directory specified on the SSH Files tab.
Using an SSH Key
After the key pair is generated, the public key must be moved to the host
system. This can be done via email, file transer program, USB memory stick or
any other file copy method available.
After copying the public key to the host, it needs to be added to the list
of authorized keys. This command is common for an RSA key:
cat id_rsa.pub >> ~/.ssh/authorized_keys
Adjust the command as needed to match the file name and host requirements.
The private key remains stored on the Mac.