To login to system Lise please
Create an SSH key pair with a passphrase that is not used anywhere else.
Generating your key pair differs depending on the SSH implementation available on your local machine. The default with Linux and MacOS is OpenSSH. This is also available (without extra installation) in more recent versions of Windows.
On your local system, run ssh-keygen
in the terminal of your choice to create an SSH key pair (type RSA) with a size of 4096 bits. During the key generation process you will be asked for a passphrase to protect the key:
$ ssh-keygen -t rsa -b 4096 -f $HOME/.ssh/id_rsa_nhr Generating public/private rsa key pair. Enter file in which to save the key (/home/user/.ssh/id_rsa_nhr): Enter passphrase (empty for no passphrase): ************************ Enter same passphrase again: ************************ Your identification has been saved in /home/user/.ssh/id_rsa_nhr. Your public key has been saved in /home/user/.ssh/id_rsa_nhr.pub. The key fingerprint is: b8:df:d1:14:48:03:00:68:5e:46:9c:1a:b2:b2:d4:f4 user@host The key's random art image is: +--[ RSA 4096]----+ | +oo....o | |. +.= . o | | =o=. . . | |o.o. E . . | |o. . S . | |. . o | | . . . | | . . . | | . . | +-----------------+ |
In this example, the private key is saved in the file /home/user/.ssh/id_rsa_nhr
, the corresponding public key in the file /home/user/.ssh/id_rsa_nhr.pub
. If you run this command, user
will be replaced by your local username.
Verify that you indeed have a passphrase on your private key with
ssh-keygen -yf $HOME/.ssh/id_rsa_nhr Enter passphrase: |
If you are not asked for a passphrase, please use ssh-keygen =pf $HOME/.ssh/id_rsa_nhr
to create a passphrase. Once you are certain that you have set a passphrase to protect the key, you can safely continue with uploading the public key as described below.
We recommend to choose a distinct comment (ssh-keygen -C "<comment>" -f <...>
) to conveniently identify your key later on.
When connecting for the first time, ssh will show you a key fingerprint of our login nodes, and ask for confirmation.
The current ssh host keys for
are
SHA256:mrwKbHEz3pJCmvU7ZEXoIKxVRz0E9/4GDp3k41x4Q8g (RSA) SHA256:53WD36v+IjHObgS3DbjIi+zShcQ/MCAIqJNgJOlfR08 (ED25519) SHA256:pNGlm//LyjJZi6tX0mz5SPSs4IBkuyJI/iWI10JbhgE (ECDSA) |
are
SHA256:rusM3G/8eG7ZFLNJtvymL/wNHFGgkOFTMYCBk3yLiL8 (ECDSA) SHA256:8/hSIv0HfMDEy1gUQjVmb0cUMDztgacNfXSBUzcgCFM (ED25519) SHA256:WulefLWFPRPPobUI6/+4bJpttV9SlQhZ0prEo8ELp1k (RSA) |
Under Windows, SSH key pairs can be generated with the tool PuTTYgen which is part of the PuTTY installation package and also available separately.
PuTTY changed its default key file format in version 0.75 from PPK2 to PPK3. This is not an issue as long as you use a PuTTY version, or software using PuTTY in its core, greater 0.75 |
Upload your public key on our Portal NHR@ZIB.
Before you can log in to one of the NHR@ZIB login nodes, make sure you have uploaded your SSH public key (not the private one) at the Portal NHR@ZIB. Here you can also view or remove public keys uploaded earlier (if any).
At the Portal NHR@ZIB, choose the item "Manage keys" / "Verwalten Ihrer Keys". For the key management you will have to log with your user name and your portal password.
For security reasons, the upload is done in two steps:
You can upload up to seven SSH public keys at the service portal.
Your SSH public keys are stored centrally in our LDAP service data base. Please do not add SSH keys discussed here to your |
Directory At least with Safari you can press Also, you can press Or, another workaround: copy your public key file to a path not containing any hidden files/directories. |
For ssh login please use ssh software on your local machine. On linux and windows systems OpenSSH and PuTTY is appropriate software, respectively.
With the -i
option to the ssh
command you can specify the full path of your private SSH key file when you log in to one of the NHR@ZIB login nodes. You will be asked for the passphrase of your private key.
$ ssh -i $HOME/.ssh/id_rsa_nhr your_username@blogin.nhr.zib.de Enter passphrase for key '/<home_directory>/.ssh/id_rsa_nhr': [...] |
Alternatively, use the SSH configuration file $HOME/.ssh/config
on your local machine to permanently store options for specific SSH connections so that they can be omitted on the command line.
For example, add the following lines to your local $HOME/.ssh/config
:
Host blogin Hostname blogin.nhr.zib.de IdentityFile ~/.ssh/id_rsa_nhr User your_username |
Now the ssh
command will automatically choose the proper credentials in the future, i. e., -l your_username
and -i <private_key>
can be omitted from the command line so that ssh blogin
is sufficient.
In PuTTY, you have to add/select your private key to Connection → SSH → Auth
to be able to log in. In PuTTY version 0.78 this option has changed to Connection → SSH → Auth
→ Credentials.
SSH for internal connections between nodes of Lise works right out of the box - that is, without specifying any keys. This is enabled through host-based authentication which is active by default.