Fingerprints from frontends
The current fingerprints for the frontends at HPC/UCPH are:
- fend01
- RSA:
- MD5:b3:40:35:76:55:ff:c4:63:74:0a:83:50:fd:20:28:43
- SHA256:67OfWJKHHXWbwVdzhr3oIUDuk4NSYcmphLOvdWZjESs
- ED25519:
- MD5:ff:cb:dc:04:8c:95:a3:f6:0f:9a:bf:2d:a3:4d:c7:aa
- SHA256:v2cAmw29A9odMriRINANvjoXKyxT7q7AoNLUyC5KLI8
- fend02
- RSA:
- MD5:38:39:90:77:68:99:a0:a9:b2:56:3f:e9:86:32:af:9d
- SHA256:NlS1kOEvGexLmgmcYVn7flDvkxrcC9/MUKW6XajCtdw
- ED25519:
- MD5:1d:c3:2e:a7:41:42:b6:7f:9d:84:5e:f2:ae:13:35:aa
- SHA256:5L7t8gAEaL1cZ2ENQHdjd1Nvw85eSEAyKptLjcKWGgs
- fend03
- RSA:
- MD5:21:32:df:99:d0:d3:5e:67:73:08:9b:5d:47:47:82:d0
- SHA256:iK7jWg8XbAmRWGg2lwvrMo7jAfcJMhujtrpu+HJ9CZo
- ED25519:
- MD5:3b:75:f0:74:d6:ef:5a:de:c9:21:b8:b0:b4:a5:ce:80
- SHA256:M40NwlrQdcf843hZNbud8aI6da5cbJhgfrM3r03uLAA
- fend04
- RSA:
- MD5:35:12:b6:a7:ac:42:64:c4:cd:c1:9b:c4:3d:36:9f:97
- SHA256:G6ZAv8lAEGW6U7yixRS9TpmiWujLmSGJMYJwwbws2BE
- ED25519:
- MD5:85:58:3f:b7:3d:ba:fe:1e:18:b8:4b:f9:fb:e3:66:e5
- SHA256:DKS8RnHpMuwtEQ8RX8eQG4Rq0YzbeaUqw7yptQGbpO8
- fend05
- RSA:
- MD5:97:03:a9:3a:15:16:be:99:a5:e1:1b:78:69:41:bf:3d
- SHA256:a8INsSU9qYN2S88gp0gglUA2R+zWAu55iL5BB+0mAqs
- ED25519:
- MD5:a3:7e:e6:23:2f:5f:83:a1:fe:4b:c3:f6:ca:a1:18:ab
- SHA256:wkQyKVHSU9hlRh2dJHzILXuMgsdxZtUdwlZgDOtqBOE
- astro01
- RSA:
- MD5:9c:ef:2a:33:e0:39:63:a8:20:88:41:3a:69:3b:3f:a9
- SHA256:QtChGn9axi8c5x+ewnI5R73iqVmC5dS26wNqx9Cj5uo
- ED25519:
- MD5:fe:49:a5:2a:70:1b:eb:d2:be:b3:75:f8:e4:24:aa:75
- SHA256:v3Nu1qkXW2jmOzOx08uXf1L14jqhQjS6eK8WKWNJAIY
- astro02
- RSA:
- MD5:e6:1d:dd:51:d9:74:d3:dd:d9:a8:d2:5f:a3:5c:01:e9
- SHA256:OuiK44dsqMgy9ZMFgoyNh24EtLRmRiTfcUBjCEOeEv8
- ED25519:
- MD5:25:6e:c0:05:f2:24:fa:fe:68:0a:94:57:4c:41:30:cc
- SHA256:oL3IbkwcpQ/wAl6gLoJQjpi43+oa8oMMcAgWDef+c90
- astro03
- RSA:
- MD5:64:8b:42:f5:75:ae:63:20:59:4e:14:fc:e6:17:1c:8c
- SHA256:zIDp2Xs80Tp8REeKFOLPQa2eOk/6QyLdxlpG+yx1rvk
- ED25519:
- MD5:ed:23:d2:d8:05:eb:7e:b2:14:9c:fc:85:3a:65:7d:83
- SHA256:+NZrXhqrNvEglewflIAAFNA+MvGxKZZDolLEHUWrSpc
- astro04
- RSA:
- MD5:f7:ce:e9:56:6f:8d:e6:0e:09:9f:4d:b4:cd:5c:b6:d9
- SHA256:VkDZRq91CaiznPci009aCbYlYF5aWZXJhCTjUABBwJg
- ECDSA:
- MD5:11:b0:84:fa:78:28:09:11:01:6c:aa:4c:bc:82:3a:53
- SHA256:mf1EMe2n/Y/lBEuYZLBna5cVQlf7RqCeExTq9sWQGFQ
- ED25519:
- MD5:43:02:79:44:de:c1:b2:29:76:41:4d:00:2c:0c:e1:38
- SHA256:sUrq7ZWPH8SJ3O54y6u4TFTkVbYodxUvrLpd2wPCvYc
- astro06
- RSA:
- MD5:7a:4a:eb:df:9a:58:34:bb:d5:db:e2:39:a7:c3:fc:8a
- SHA256:zpyY4fD3tZypsWGEwjO8K50TwjAOSZ5eWy6PweDK3ao
- ED25519:
- MD5:c6:82:5d:10:73:4a:07:d7:cd:66:d6:bb:0f:db:2f:ba
- SHA256:kT43lVNE2CCpoG7+g9A73okUuMv03bwpi4lFaSC2WDY
- astro07
- RSA:
- MD5:c1:fb:4e:96:dd:78:b0:5a:92:4b:57:3b:a7:58:69:16
- SHA256:up2nuAs6rc12ql032m9Njj/Qr6EqaOonmUJfph/XM7U
- ED25519:
- MD5:12:67:9d:26:a2:56:e6:15:40:50:a3:22:d9:31:36:cc
- SHA256:4pQXlauu5vhAQd/PxHniburvxoJsunYYokxUXrdj6lE
- magni
- RSA:
- MD5:b1:35:dc:23:d7:65:23:b2:4c:2c:24:52:a0:bf:fc:ed
- SHA256:psdxTz3TKN/RK63p4C1Le7qgFqo7218IR5N5Wev1qSY
- ED25519:
- MD5:df:d5:3f:79:1a:29:73:06:f5:4b:65:99:38:e3:62:2d
- SHA256:SfaoOPmcr1GFXksFvSM2btEyBx0HfIq5bmN1CUWswQU
- dark01
- RSA:
- MD5:d3:45:30:a5:62:91:0b:84:27:e4:d0:76:05:9a:ff:d4
- SHA256:XeDcj07Ze1+pyWQQ1dHw4wZVKIF+g4Rhq+H6SFayha8
- ED25519:
- MD5:ed:d5:7e:99:d8:e4:a8:24:f0:d4:1c:9b:8a:40:c0:02
- SHA256:flWMAnGpUX/D8z/CGxQTxKOYXLyP/jxeXUZvGwFB1V8
- hep01
- RSA:
- MD5:ed:dc:2a:81:a7:98:6f:12:0c:bc:ab:b1:b1:05:5d:22
- SHA256:S/J23s0SgFRF+bH/jO5Qz7EMe4hsv6QanE5aimzJrbU
- ED25519:
- MD5:b1:68:70:93:8a:af:a6:3d:dd:0e:6a:98:4f:a8:70:d1
- SHA256:qusuB9XK9EKtV2Djv9iBSBJ7QWWUmOAWwm0eqgtXOgg
- hep02
- RSA:
- MD5:c7:a6:77:25:19:d5:f7:fd:f6:a2:40:3f:3a:60:97:ee
- SHA256:JPQQC8VaIch0IUMosuT9Ylci/h77xxwlkgUciafeglc
- ED25519:
- MD5:f7:90:c7:e1:ab:fe:bb:bd:08:5a:db:5b:8e:84:d7:2d
- SHA256:6jIV5/XdxPhEveqz2WHwMM9E2ibnl6fLPnV9YUF0YIk
- hep03
- RSA:
- MD5:2f:70:b1:ec:ef:ba:4c:84:5e:4a:e8:44:94:83:51:25
- SHA256:CE40rtrsFgEkllHhuJ2rMrRwiVfsQVyov4K/b/KsgkI
- ED25519:
- MD5:8b:76:af:1c:fb:54:3a:57:5c:36:a5:e9:91:e3:9b:c3
- SHA256:PZTzcEL/7D/w6LN4kZfEemX5Ne/QPPK4ByEResw9gzc
- hep04
- RSA:
- MD5:48:c2:eb:bc:6a:67:72:b1:ab:a7:8b:ed:c4:72:d6:fd
- SHA256:O0ok6NJkvCU3YjVQg83zYu31xrwmqDDt7WyEWdKaHs4
- ED25519:
- MD5:d9:de:2f:c3:01:86:df:5e:e7:10:dd:1f:12:49:96:a5
- SHA256:GfnZuycIqr2ekmuEgvJ60pJB2/1XB5qV/SkH8MipkME
- otp
- RSA:
- MD5:24:eb:cb:74:ac:30:5f:4d:11:22:a4:31:92:64:71:d3
- SHA256:vY0i7rfIfWwINzJPjtrUhE40rzHfgqN2rsq+YvcQXug
- ED25519:
- MD5:d7:0f:97:70:fb:fb:e5:d8:52:f6:c8:e1:4f:22:0e:5b
- SHA256:LzIrr4wIlbflszB5q95hk5lTIFuBozX9sZw+I47Tcoo
- front
- RSA:
- MD5:64:21:45:eb:52:99:20:f0:cf:44:47:f2:c6:d1:ec:35
- SHA256:uHbXXasbYpHjH11t1L57AJpNIz8N0Pfc5HARECv75Ac
- ED25519:
- MD5:4b:7f:28:e6:8e:61:7f:84:73:37:dc:95:65:70:2c:fb
- SHA256:k3/7UXS+Itt8samNGiS/S0MW7WctYFIE2jgAJCtzrQk
Handeling old fingerprints
If you have used a frontend before, you should get a warning about a
new fingerprint. If the reported fingerprint matches the list abowe,
please update -- if it doesn't match, something is wrong and
you should try another frontend - and if the problem persist, contact
support.
Example:
$ ssh fend03
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: POSSIBLE DNS SPOOFING DETECTED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
The RSA host key for fend03.hpc.ku.dk has changed,
and the key for the corresponding IP address 10.266.1.13
is unknown. This could either mean that
DNS SPOOFING is happening or the IP address for the host
and its host key have changed at the same time.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now
(man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
SHA256:1o/3qHI/ImLYjuME0llmztWy6IuXxZY4sLM0r1NR2hM.
Please contact your system administrator.
Add correct host key in /path/to/.ssh/known_hosts to get
rid of this message.
Offending ECDSA key in /path/to/.ssh/known_hosts:433
RSA host key for fend03 has changed and you have
requested strict checking.
Host key verification failed.
If the fingerprint matches the list at the top, update it locally - either by removing the old fingerprint with an editor or by running:
ssh-keygen -R fend03.hpc.ku.dk
Checking the hostkey, I can now connect to fend03
ssh HPCuser@fend03
The authenticity of host 'fend03 (10.266.1.13)'
can't be established.
RSA key fingerprint is
SHA256:1o/3qHI/ImLYjuME0llmztWy6IuXxZY4sLM0r1NR2hM.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'fend03,10.266.1.13'
(RSA) to the list of known hosts.
[HPCuser@fend03 ~]$
Disconnects while idle
On some networks, the router/firewall will drop what it consider
idle/stall (ssh) connection. This can be prevented by adding:
Host *
ServerAliveInterval 60
to
.ssh/config on your local laptop/computer.
Windows CMD
Users on Windows, might get:
Corrupted MAC on input.
ssh_dispatch_run_fatal: Connection to X.X.X.X port 22: message authentication code incorrect
A workaround is to add the flag -m hmac-sha2-512 to the ssh command (and -o MACs=hmac-sha2-512 to your scp command), or MACs=hmac-sha2-512 to your ssh_config for the host(s) where you experience this issue.
More information in this upstream issue.
OS X Terminal
Users on OS X, might get:
-bash: warning: setlocale: LC_CTYPE: cannot change
locale (UTF-8): No such file or directory
See a solution here (Method #1 or Method #2)
An alternative suggestion is to to add:
export LANG=en_US.UTF-8 LC_CTYPE=en_US.UTF-8
to .bash_profile on the Mac and restart the shell.
Note: We don't have Mac's, so we have not testet this ourself.
|