Public Login Servers
TIG maintains a public login server, login.csail.mit.edu, for the convenience of the community. The system runs 64-bit Debian GNU/Linux
and provides access to the CSAIL AFS cell
for accessing your directory space or managing your personal web page
or your group's web hosting.
login32.csail.mit.edu is similarly configured, but runs 32-bit Debian GNU/Linux.
Accessing these servers
You must have a CSAIL Kerberos principal.
- From GNU/Linux and other unix-based systems (eg, Mac OS, *BSD, ...), insert your username for YOU in
- From Windows systems, use PuTTY
SSH RSA/DSA fingerprints
If your ssh client is configured for Kerberos ("repeated access" above), it will automatically verify the identity of the server you're connecting to using its Kerberos key. If not, and you wish to manually verify the RSA/DSA key of login / login32, read on:
NOTE: as of March 2012, the "login" alias and RSA/DSA keys were migrated to login64, a.k.a. scooby-doo. The host shaggy.csail.mit.edu, the old "login", no longer exists.
RSA fingerprint for login.csail.mit.edu
DSA fingerprint for login.csail.mit.edu
NOTE: as of March 2012, the machine "login32", a.k.a. velma, was created for tasks requiring 32-bit libraries.
RSA fingerprint for login32.csail.mit.edu
DSA fingerprint for login32.csail.mit.edu
For continuous connections to login.csail.mit.edu and login32, Kerberos tickets and the AFS tokens that depend on them will expire every 10 hours. Run
to obtain new credentials. After they expire, your session will remain open, but you will have very little access to files (as "system:anyuser", the AFS equivalent of "nobody".)
Many standard packages are available on these systems. Some packages can be added to your environment using DotSoftware
; if you still don't see what you're looking for, contact TIG