►
A
All
right:
okay,
hello,
hello,
hello,
hello,
great,
so
we're
going
to
we're
going
to
generate
an
ssh
key
and
launch.
I
know
I
just
gave
a
giant
speech
about
how
I
wanted
to
automate
everything
before
we
launched
one
vm,
but
we're
just
gonna
launch
the
vm
and
we're
going
to
do
this
thing,
which
is
a
high
value
target,
because
I
think
that
I
realized
that
the
length
of
the
amount
of
stuff
that
needs
to
be
done
from
that
you
know
game
plan
is
a
lot.
A
So
let's
focus
on
something
that
will
get
immediate
value
and
so
we'll
just
spin
up
some
vms
and
we'll
just
do
it
on
one
vm,
we'll
just
crank
up
the
vm,
we'll
crank
up
tvx,
tbx
and
ibm
we'll
just
play
around
okay.
So.
A
A
Okay,
so
here
we,
I
believe
we
did
this
on
video
right.
So
in
the
log
I
think
last
I
think
I
remember
I
haven't
said
that
it's
in
the
notes-
okay,
so
docs.ci,
so
this
is
basically
we're
doing
we're
scoping
we're
scoping
the
credential
here,
the
credential
being
the
email
that
we're
associated
with
here.
Perhaps
we
should
do
that
not
on
the
domain.
A
All
right
so
now,
what
that
tells
us
is
that
we're
going
to
run
untrusted
code,
so
nadine.com
we're
going
to
run
untrusted
code
or
potentially
there's
going
to.
Potentially
things
will
get
popped
alice.
Should
I
contribute
that's
the
base
flow
which
we're
overlaying
right,
and
so
this
is.
The
identity
is
associated
with
this
okay,
so
the
identity
is
associated
with
that.
A
Which
helps
us
identify
which
scopes,
which?
Whose
domain?
Whose
email
domain
we
currently
play
with.
A
As
a
concept
where
we
are
exploring
scoping
identity
credentials,.
A
Okay,
so
alice
dot,
please,
or
should
I
contribute?
A
A
All
right,
there's
what
the
key
looks
like
and
nist
came
out
with
crypto
guidelines
recently,
so
4096
rsa
keys
where
possible-
and
this
is
where
I
think
we
talked
about-
that
the
other
stuff
breaks
down
post
quantum,
the
what
current
web
five
e
c
d
e
e
e
d,
ed25519.
A
A
A
A
User
data,
so
what
does
user
data
do
here?
It's
like
this
is
like
a
okay
and
I'm
just
gonna
choose
this
one
to
give
us
some
power.
Actually,
let's
just
choose
this
one,
so
let's
just
do
actually
they
haven't.
Given
me
access
to
this
whoa.
A
A
Okay,
so
what
is
this
there's
something
that
we
want,
so
these
are
known:
host
file,
user,
known
host
file.
A
A
Okay,
these
are
known
whole
host
file,
so
this
says
so
we're
setting
a
couple
options
on
here,
we're
going
to
say
so:
it's
user
known
host
file
and
then.
A
Okay,
so
what
is
this?
This
is
use
ssh
key
for
auth.
I
don't
accept
or
always
accept
server
key
right,
so
we
don't
care
about
the
server
key
because
yeah
we,
this
is
a
meaningless
machine.
Obviously,
so
don't
don't
put
anything
you
care
about
on
this
machine.
A
A
Sshd
start
maybe
via
systemd
files,
okay,
so
because
you
can
have
systemd
files
to
say
start
after
another
thing:
okay,
start
after
sshd
is
up.
A
A
Okay,
this
way
we
can
verify
then
give
can
drop
the
no
host
key
checking.