# External kista
External kistas support labs with a trusted way to transfer data from an external user located outside HUNT Cloud and into a lab in HUNT Cloud.
Note
This page describes the practical aspects of external kista transfers. Head over to our External kista FAQ for more information on the service itself.
# For external users
This section aims to give a technical description on how external users outside HUNT Cloud can connect and transfer data to our hosted SFTP service called external kista.
In short, external kistas are short-lived and hardened SFTP (opens new window) servers dedicated to transferring data. Please contact us if you require more information or run into trouble.
Technical requirements
As an external user outside HUNT Cloud, you will need to meet the following technical requirements to transfer data to/from a external kista.
All major operating systems such as Windows, MacOS and Linux are supported.
# Network connection to HUNT Cloud
Your host organization might need to open it's network firewall in order for your computer to connect and transfer to the external kistas in HUNT Cloud. Below are the network details that your organizational IT department will need add such a firewall opening:
- External kista IP address:
129.241.176.121
- Port range:
2000-2128
- Protocol:
TCP
We will select one specific port number during the kista deployment. This will be forwarded in the transfer information to your HUNT Cloud party when the external kista has been setup.
# SSH key pair
You will use a SSH public key
to authenticate and access your kista instead of passwords. You must therefore send us such a key before we can deploy your kista. This section describes how to do this.
1. Generate a SSH key pair
We recommend that you create a dedicated SSH key pair for each kista transfer. Click on the section below for a step wise guide on how to generate a new key pair in Windows that you can use for your kista access.
How to generate a RSA SSH key pair on Windows with WinSCP
WinSCP (opens new window) is an open source data transfer client for Windows that we recommend for SFTP transfers. Download WinSCP from winscp.net (opens new window) and install the software. Follow these steps to generate a RSA SSH key pair:
- In
WinSCP
:- Click
New Session
- Click
Tools
- Click
Run PuTTYgen
- Click
- In
PuTTY Key Generator
:- Click
Generate
to generate a new RSA key pair.
- Click
- In
PuTTY Key Generator
:- Enter
ekista
inKey comment
- Enter a passphrase in
Key passphrase
- Enter the same passphrase in
Confirm passphrase
- Note. You will use this passphrase when you use the SSH key during the kista connection, so please make sure to remember it or store it in a suitable password manager.
- Click
Save private key
- Enter
- In
Save private key as
window:- Select a place to store the private key
- Enter
ekista
as the filename - Click
Save
- In
PuTTY Key Generator
:- Click
Save public key
- Click
- In
Save public key as
window:- Select a place to store the public key
- Enter
ekista.pub
as the filename - Click
Save
You should now have a SSH key pair consisting of the following files:
- The private key
ekista.ppk
- The public key
ekista.pub
How to generate a RSA SSH key pair on OS X, macOS and Ubuntu
1. Generate a new dedicated public/private RSA key pair.
cd ~/.ssh
ssh-keygen
You should see the following output:
Generating public/private rsa key pair.
Enter file in which to save the key (/your_home/.ssh/id_rsa):
2. Name the key.
Name your key ekista
and press enter.
Enter file in which to save the key (/your_home/.ssh/id_rsa): ekista
3. Add a passphrase for you key.
Enter passphrase (empty for no passphrase):
We recommend that you add a passphrase on your key. You will use this passphrase when you use the SSH key during the kista connection, so please make sure to remember it or store it in a suitable password manager.
The key should not be generated with the expected output:
Your identification has been saved in ekista
Your public key has been saved in ekista.pub
The key fingerprint is:
SHA256:<long textstring>
The key's randomart image is:
+---[RSA 3072]----+
| .... |
| +.= |
| o O . |
| o + * |
| . OoS.=. |
| o . =o=o*oo |
|. B ..+.o.E o |
| + = ..ooo = |
| o oo o= |
+----[SHA256]-----+
- Send us your public key.
See your new key files:
ls | grep eksita
Accepted key types
We accept the following public key types:
- RSA
- ECDSA
- Ed25519
2. Share public SSH key with HUNT Cloud
After generating the SSH key pair, please share the public key (not the private one) with us. Send your new public key (ekista.pub
) as an email attachment to your HUNT Cloud contact that can forward your key to us as an attachment in their service order.
# SFTP client
You will need a SFTP client to connect and transfer data to the external kista. For Windows, we recommend the WinSCP client. OS X, macOS and Ubuntu can use built in command line tools.
In addition to the SFTP software, you will need the external kista transfer information shipped by HUNT Cloud on the time of deployment to be able to connect.
Access information from HUNT Cloud
You will need the following information from HUNT Cloud to connect to your kista:
Host name
Port number
User name
Below is a guide on how to connect using the WinSCP SFTP client on Windows.
How to connect to an external kista on Windows with WinSCP
- In
WinSCP
:- Click
New Session
- Click
- In the
Login
window:- Enter
ekista.hdc.ntnu.no
asHost name
- Enter the port number from the transfer information as
Port number
(the number in the example will not work). - Enter the user name from the transfer information as
User name
(the name in the example will not work). - Click
Advanced
- Enter
- In the
Advanced Site Settings
window:- Select the
Authentication
page in the sidebar - Uncheck the
Attempt 'keyboard-interactive' authentication
checkbox - Enter the location of the
Private key file
. If you followed the previous guide, then this should be the location of theekista.ppk
private key file. - Click
OK
- Select the
- In the
Login
window:- Click
Save
- Click
- In the
Save session as site
window:- Choose a
Site name
if required, combining theUser name
andHost name
(the site name given in the example will not work). - Click
OK
- Choose a
- In the
Login
window:- Click
Login
- Click
- In the
Warning
window:- Compare and verify that the appropriate
SHA-256 key fingerprint
from the transfer information matches - Click
Yes
- Compare and verify that the appropriate
- In the
Authentication Banner
window:- Read the information banner to ensure you are connecting to correct kista
- Click
Continue
- In the
Key passphrase
window:- Enter the passphrase for your private key. If you followed the previous guide, this should be the
ekista.ppk
key and passphrase that you set during the generation in the SSH key pair section above. - Click
OK
- Enter the passphrase for your private key. If you followed the previous guide, this should be the
- In
WinSCP
:
- You should now be connect to the SFTP server
- Upload data in the
upload
directory
How to connect to an external kista on OS X, macOS and Ubuntu
You can connect to the kista from your local computer using the built in SFTP tool.
# -- principal example
sftp -oPort=<port-number> <username>@ekista.hdc.ntnu.no
# -- practical example
sftp -oPort=2124 johndoe-importer@ekista.hdc.ntnu.no
Once logged in you can follow the examples from our internal kista guide for upload or download of data.
# For internal users
Follow the examples from our internal kista guide.