Difference between revisions of "Host keys for Euler login nodes"

From ScientificComputing
Jump to: navigation, search
(Currently valid keys)
 
(3 intermediate revisions by the same user not shown)
Line 20: Line 20:
 
==Currently valid keys==
 
==Currently valid keys==
 
The MD5 and SHA256 fingerprints of the login nodes' ED25519 and RSA keys are:
 
The MD5 and SHA256 fingerprints of the login nodes' ED25519 and RSA keys are:
 
* ED25519 : MD5:2f:c3:be:36:60:86:28:34:d8:4e:cb:27:66:66:25:a4
 
* ED25519 : SHA256:cbQ9er7E8tFacneNGj2ze09bQUapCuUni5JMiF+wH0A
 
* RSA : MD5:ab:4b:dd:24:2a:22:eb:5a:74:2a:72:ed:9c:d1:ad:6f
 
* RSA : SHA256:qdZ/jPc7HODpO2BmCtJxO51jFZVt1t6fjjbtiUAZemI
 
 
Some SSH clients (for instance tectia ssh) display the fingerprints in the bubble babble format:
 
 
* ED25519 : xedal-cofeh-dakod-vaful-rolus-hazys-ruvub-caloh-bogef-rereb-zuxox
 
* RSA : xibef-zopuc-tyrur-cukuz-latav-zadah-gemeh-rihin-rigis-cugys-haxux
 
 
<!--
 
The MD5 and SHA256 fingerprints of the login nodes' ED25519 and RSA keys are:
 
 
2048 SHA256:Em+yWIT+FDHy7kfQ9IIgdDiF2d8Q8ul36LPSjRv0yz4 login.euler.ethz.ch (RSA)
 
256 SHA256:ontwFjITBT9rYE+4QnoN8272Q47W6OGOd5dwFfBivZ0 login.euler.ethz.ch (ED25519)
 
 
eu-login-00:tmp $ ssh-keygen -l -f /tmp/x -E md5
 
2048 MD5:4f:07:8a:47:a5:bf:c5:22:35:36:79:22:0b:36:d8:60 login.euler.ethz.ch (RSA)
 
256 MD5:96:0b:48:81:89:18:d1:22:0d:e5:e0:17:7d:d9:02:d2 login.euler.ethz.ch (ED25519)
 
  
 
ED25519:
 
ED25519:
SHA256:ontwFjITBT9rYE+4QnoN8272Q47W6OGOd5dwFfBivZ0
+
SHA256:ontwFjITBT9rYE+4QnoN8272Q47W6OGOd5dwFfBivZ0
 +
MD5:96:0b:48:81:89:18:d1:22:0d:e5:e0:17:7d:d9:02:d2
  
 
ECDSA:
 
ECDSA:
 
+
SHA256:QpLAVp8eBluW+PU+keL3YkZr0ggU/B8wYtRp2KMuEXo
 +
MD5:56:98:04:dd:13:00:c6:62:63:95:dc:a4:c6:b0:e7:bb
  
 
RSA:
 
RSA:
SHA256:Em+yWIT+FDHy7kfQ9IIgdDiF2d8Q8ul36LPSjRv0yz4
+
SHA256:Em+yWIT+FDHy7kfQ9IIgdDiF2d8Q8ul36LPSjRv0yz4
 
+
MD5:4f:07:8a:47:a5:bf:c5:22:35:36:79:22:0b:36:d8:60
-->
 
  
 
==How to remove the old key and add the new one==
 
==How to remove the old key and add the new one==
Line 67: Line 48:
 
* Navigate to '''HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\SshHostKeys'''
 
* Navigate to '''HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\SshHostKeys'''
 
* Delete the host key for '''euler.ethz.ch'''
 
* Delete the host key for '''euler.ethz.ch'''
 +
 +
If you are using native SSH in Windows 10, then please run the command (this is only supported in Windows 10)
 +
 +
ssh-keygen -R euler.ethz.ch
  
 
After removing the old host key, you need to login again, compare the displayed host key with the ones published on our wiki and accept the new one in case it is matching.
 
After removing the old host key, you need to login again, compare the displayed host key with the ones published on our wiki and accept the new one in case it is matching.

Latest revision as of 13:20, 3 June 2020

Introduction

When we replace the login nodes, the host keys will change, therefore upon next login you will receive a message

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
SHA256:qdZ/jPc7HODpO2BmCtJxO51jFZVt1t6fjjbtiUAZemI.
Please contact your system administrator.
Add correct host key in /path/to/your/home/.ssh/known_hosts to get rid
of this message.
Offending RSA key in /path/to/your/home/.ssh/known_hosts:252
RSA host key for euler.ethz.ch has changed and you have requested strict
checking.
Host key verification failed.

Currently valid keys

The MD5 and SHA256 fingerprints of the login nodes' ED25519 and RSA keys are:

ED25519:

SHA256:ontwFjITBT9rYE+4QnoN8272Q47W6OGOd5dwFfBivZ0
MD5:96:0b:48:81:89:18:d1:22:0d:e5:e0:17:7d:d9:02:d2

ECDSA:

SHA256:QpLAVp8eBluW+PU+keL3YkZr0ggU/B8wYtRp2KMuEXo
MD5:56:98:04:dd:13:00:c6:62:63:95:dc:a4:c6:b0:e7:bb

RSA:

SHA256:Em+yWIT+FDHy7kfQ9IIgdDiF2d8Q8ul36LPSjRv0yz4
MD5:4f:07:8a:47:a5:bf:c5:22:35:36:79:22:0b:36:d8:60

How to remove the old key and add the new one

Linux/Mac OS X

Please remove the old host key with the following command

ssh-keygen -R euler.ethz.ch

After removing the old host key, you need to login again, compare the displayed host key with the ones published on our wiki and accept the new one in case it is matching.

Windows

If you are using PuTTY, then you can remove the old host keys in the Windows registry.

  • Start regedit.exe
  • Navigate to HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\SshHostKeys
  • Delete the host key for euler.ethz.ch

If you are using native SSH in Windows 10, then please run the command (this is only supported in Windows 10)

ssh-keygen -R euler.ethz.ch

After removing the old host key, you need to login again, compare the displayed host key with the ones published on our wiki and accept the new one in case it is matching.