About SSH
SSH (Secure Shell) is a protocol for safely connecting to remote servers. It encrypts your connection so you can:- Log in securely
- Run commands remotely
- Transfer files without exposing your data
Vast.ai instances are configured to accept keys only - Password authentication is disabled for improved security.
Quck start: Generate and add your SSH key to your Vast account.
1.Generate a SSH key pair in your terminal 2.Copy your public key.3. Add it in your vast account.
- Creates two files (by default in ~/.ssh/):
- id_ed25519 → your private key (keep safe, never share).
- id_ed25519.pub → your public key (safe to share, add to servers).
- -C “your_email@example.com” is optional. Whatever you put there is stored as a comment in the public key file (e.g., id_ed25519.pub). It’s just for identification (helpful if you use multiple keys), not for security.
When you run ssh-keygen -t ed25519 in Windows PowerShell, the keys are created in your Windows user profile folder:
C:\Users\<YourUsername>\.ssh\

- Adding a key to your account keys only applies to new instances.
- Existing instances will not get the new key automatically. To add a key, use the instance-specific SSH interface.
- For VM instances, changing keys requires recreating the VM.
Connecting to your Instance
Start a new instance and click the SSH icon to see your connection information.
Terminal Connection Options
Bash

Connected to Instance
Tmux
We connect you to a tmux session by default for reliability and to prevent unintentional termination of foreground processes. You can create a new bash terminal window withctrl+b
+ c
. Cycle through your windows with ctrl+b
+ n
There is an excellent guide for getting to grips with tmux at https://tmuxcheatsheet.com
If, however, you would prefer to disable TMUX, you can apply the following either in a terminal or from your template’s on-start section.
Text
SSH Local Port Forwarding
An often overlooked feature of SSH is its ability to forward local ports to another machine. When you access a server remotely over SSH, you can make ports from the remote machine available as if they were listening on your own device. This is a secure alternative to opening ports on the public interface as all data is transported over the SSH connection.Bash
- Connects to IP 180.123.123.123 as user root
- Uses port 1234 instead of the default SSH port 22
-L 8080:localhost:8080
- Creates a tunnel so when you access localhost:8080 on your local machine, it forwards to port8080
on the remote server-L 5000:localhost:5000
- Same thing for port5000
-L
arguments to forward as many ports as you need.
What this means: After connecting, you can open your web browser and go to https://localhost:8080 or http://localhost:5000 on your local computer, and you’ll actually be accessing services running on those ports on the remote server. It’s like creating secure “tunnels” through the SSH connection to reach applications on the remote machine that might not be directly accessible from the internet.
SSH Alternative - Jupyter Terminal
As a simple alternative to SSH, you might like to consider Jupyter Terminal instead. All instances started in Jupyter launch mode will have this enabled. It is a very straightforward web-based terminal with session persistence. It’s great for a quick CLI session. Access the terminal from the SSH connections interface.
Troubleshooting
You can often determine the exact cause of a connection failure by using the -vv arguments with ssh to get more information. Common reasons include:- Using the wrong private key
- Incorrect permissions for your private key
- Public key not added to instance or account
- Connecting to the wrong port
SCP & SFTP File Transfer
Both SCP (Secure Copy Protocol) and SFTP (SSH File Transfer Protocol) are tools for securely transferring files that piggyback on the SSH protocol. They use the same authentication and encryption as SSH.SCP (Secure Copy Protocol)
- What it is: Simple, command-line tool for copying files between local and remote machines
- Best for: Quick, one-time file transfers
- Syntax:
scp -P <port> source destination
Bash
SFTP (SSH File Transfer Protocol)
- What it is: Interactive file transfer program with a full command set
- Best for: Managing files, browsing directories, multiple operations
- Usage: CLI or GUI tools available
Bash
Note that both scp and sftp take the
-P
argument in uppercase. This differs from the ssh command which uses lowercase.VS Code Integration
Once you have your ssh keys set up, connecting to VS Code is quite straightforward. We will cover the basics here.Install the Remote SSH extension
You will need to add the remote extension named ‘Remote - SSH’.
Open Remote Window
Click the open remote window button.

Open Remote Window
Enter your ssh address details in the box that appears at the top of your window

GUI Setup Guide (Windows)
Several GUI tools are available to help with SSH connectivity. While it is often most straightforward to use the terminal we will cover some of the popular options here. For each application we will assume the following:- IP address: 142.114.29.158
- Port: 46230
- Username: root

Example SSH Details
PuTTY
PuTTY consists of two important components - PuTTY for making connections and PuTTYGen for creating SSH keys. First, we will generate a public and private key pair. PuTTy uses its own.ppk
private key type.
Open PuTTYGen and click the ‘Generate’ button. You will be asked to move your mouse around until the green bar is full.

PuTTYgen Key Generation

Save Keys

Server Details

Connection Data

SSH Credentials

Save Connection
MobaXterm
First, we need to create a public and private key pair. MobaXterm uses puTTY style.ppk
keys.
Open the application and navigate to Tools -> MobaKeyGen (SSH Key Generator)
Glick the ‘Generate’ button. You will be asked to move your mouse around until the green bar is full

Generate Key

Save Keys

Create a Session
- Remote Host
- Specify Username (root)
- Port
- Use private key

Successful Connection
Other GUI Clients
Many GUI clients are available for Windows and other operating systems, and although it is not possible to cover all of these here, the key things to remember when setting up are:- Create a public and private key pair
- Add the public key to your vast account and any running instances
- Keep the private key safe
- Ensure you are connecting to the correct IP address and port as user
root