Telnet and SSH

SSH on CS Computers

SSH Key Fingerprints

The first time you connect to a computer using ssh or similar, it will display a key fingerprint which you should verify is correct. This is to prevent what’s called a man in the middle attack where an attacker pretends to be the machine you’re connecting to and intercepts your password or traffic. Our fingerprints are:


RSA key fingerprints: 

ECDSA key fingerprints: 


RSA key fingerprints: 

ECDSA key fingerprints: 

Connecting to CS Computers

For security reasons, we have turned off all commands that use clear text passwords such as telnet (use ssh instead), ftp (use sftp instead), and rsh (use ssh instead).

Via a windows ssh client

Obtaining Putty

To download Putty, please visit:

  1. Click putty.exe and download it to your desktop
  2. Double-click on the putty.exe icon on the desktop to start putty
  3. In Host Name section, type in: “” or “”
  4. Under Protocol, be sure to check “SSH”
  5. Under Saved Sessions, type in “Cluster” and click Save. (From now on, you should be able to double-click on the saved session to connect to or
  6. Click Open
  7. For the first time you log into clic or compute using putty, you will see a new window pop-up with “Putty Security Alert: The server’s host key is not cached in the registry. You have to guarantee that the server is the computer you think it is. The server’s key fingerprint is: … .. .. “. Click “Yes”
  8. You should see “login as: ” in the main window. Type in your username.
  9. Type in your password and you should be logged into clic or computer