Skip to main content

SSH Fingerprints

The login node "mlogin01.hrz.tu-freiberg.de" has the following fingerprints:

MD5:1f:ec:9f:98:88:f6:6d:2f:00:0b:ba:57:2b:1e:20:b1 (RSA)
MD5:51:d4:14:e6:ee:d4:fe:be:99:51:5c:04:75:fa:e1:65 (DSA)
MD5:d0:e5:cd:f1:0b:60:ab:51:5e:d4:f7:96:e7:dc:b7:d0 (ECDSA)
MD5:1e:6b:7c:af:64:8f:b6:eb:40:38:40:87:09:0e:c9:8d (ED25519)

SHA256:lXvB+X8LppUOiWnmikBvazRa37UZCiFsrAyxP/gG7js (RSA)
SHA256:xw0VZ4Q9I8yPIgt2RmRugM1Y32nq8L730VpKDqU++o4 (DSA)
SHA256:jP01F6I2hoC1Ca3EW43S7oMOsgfgmBPbnjzRL9qIS9w (ECDSA)
SHA256:E+U6Dm58eHG87mE+m71doFb19ckx1L0vZzgWMneRJW0 (ED25519)

Dealing with SSH key pairs

To transfer data from the cluster to other systems, it is advisable to store a key pair on the cluster. We provide the following instructions for this:

  • Use a specially generated key pair on the cluster.
  • Do not use an empty passphrase! Assign a unique passphrase that you do not use for any other keys.
  • Add the "from clause" for mlogin01.hrz.tu-freiberg.de to the entry in the "authorised_keys" on the target system to make it more difficult to use your key pair in the event of theft.

Password security

For your own security, do not use the same password for external systems (e.g. clusters of other universities) as for your URZ login. Please follow the corresponding instructions of other service providers or their specifications for complexity requirements.