Public Login Servers

TIG maintains a public login server, login.csail.mit.edu, for the convenience of the community. The system runs Ubuntu 14.04LTS and provides access to the CSAIL AFS cell for accessing your directory space or managing your personal web page or your group's web hosting.

Accessing these servers

You must have a CSAIL Kerberos principal.
  • From GNU/Linux and other unix-based systems (eg, Mac OS, *BSD, ...), insert your username for YOU in ssh YOU@login.csail.mit.edu
  • From Windows systems, use PuTTY
    • For repeated access, we recommend configuring PuTTY with Kerberos?.

SSH RSA/DSA/ECDSA fingerprints

If your ssh client is configured for Kerberos ("repeated access" above), it will automatically verify the identity of the server you're connecting to using its Kerberos key. If not, and you wish to manually verify the RSA or ECDSA key of login, you can download a PGP-signed text file with all of the key fingerprints. The fingerprints are also publishing in the DNS using SSHFP records.

Notes

For continuous connections to login.csail.mit.edu, Kerberos tickets and the AFS tokens that depend on them will expire every 10 hours. Run renew to obtain new credentials. After they expire, your session will remain open, but you will have very little access to files (as "system:anyuser", the AFS equivalent of "nobody".)

Many standard packages are available on these systems. Some packages can be added to your environment using DotSoftware; if you still don't see what you're looking for, contact TIG.
Topic revision: 07 Sep 2016, GarrettWollman
 

MIT Computer Science and Artificial Intelligence Laboratory

 

  • About CSAIL
  • Research
  • News + Events
  • Resources
  • People

This site is powered by Foswiki MIT: Massachusetts Institute of Technology