Logo

HPC @ Uni.lu

High Performance Computing in Luxembourg

Accessing the HPC Platform

The access to the HPC platforms is restricted to SSH connections, using public key authentication rather than password. This aspect is discussed here for instance and permits to prevent (or at least limit the impact) of Kiddie scripts that attempt automatic attacks performing dictionary-based password guessing.

Understanding SSH

Developed by SSH Communications Security Ltd., Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another in a secure way. It provides strong authentication and secure communications over insecure channels. To use SSH, you have to generate a pair of keys, one public and the other private. The public key authentication practiced on the UL HPC platforms assumes that the public key is known by the system in order to operate an authentia tion based on a challenge/response protocol instead of the classical password-based protocol. The way SSH handles the keys and the configuration files is illustrated in the following figure:

SSH Schema

Installation / configuration / first access

Linux/BSD users

MacOs users

Windows users

Troubleshooting

Transferring files