A fine example both of self-selection of applicants, and signaling by both parties, that might even be better than application puzzles since it has a lower bar of entry, and therefore casts a wider net!
If I had a dollar for every person I've seen who sent me their private SSH key by email or slack... Or didn't have any keys on their workstation at all and had to be taught how to generate a basic ssh2 rsa key pair.
And being unable to properly google is pretty good screening. I feel like a programmer who knows when to turn to stackoverflow is a lot more valuable than one that can eventually work it out by brain-power alone but takes three months to do it.
Yes you need to know how to actually program without just using snippets but also yes if you're trying to diff two files in a commandline environment just google the answer - some people will know it by rote but I've got nothing against people that can pickup new tools and learn to use them without much guidance.
the persons running the sshd would get the public crypto fingerprint of whatever ssh keys your ssh client tries to present to the sshd upon login (such as if you just have a public/private key pair in ~/.ssh/id_rsa and id_rsa.pub), your ssh client version, and your IP address.
I really want to pull rank and tell you how deeply involved I am in the Unix community. Nevertheless, suffice it to say I know that, and the mistake you are making is this is NOT Unix. It's just a poorly written text parser that simulates a Unix command line.
I'm not sure what pulling rank would achieve here, you're talking to somebody who ran a datacenter in the same room as CSRG ran their BSD boxes (but 20 years later).
I completely and totally understood that this was not a real UNIX system.