On Wed, Nov 28, 2012 at 1:50 PM, Jakov Sosic <jso...@srce.hr> wrote:
> On 11/26/2012 08:54 PM, Matt Zagrabelny wrote:
>> On Mon, Nov 26, 2012 at 1:47 PM, Jakov Sosic <jso...@srce.hr> wrote:
>>> Hi.
>>>
>>> I'm wondering is there a way to manage ssh servers, in a way that every
>>> machine has it's own key?
>>
>> I've used the "private" file server mechanism to serve out node sensitive 
>> files.
>
>
> Thank you for the idea. Now only problem that is left is how to call a
> script to generate keys if files are not accessible in private section :-/
>
> I know one can do something like this:
>
>   file { '/etc/ssh/ssh_host_rsa_key.pub':
>     ensure  => file,
>     mode    => 0644,
>     source  => [
>       'puppet:///private/etc/ssh/ssh_host_rsa_key.pub',
>       'puppet:///modules/sshd/ssh_host_rsa_key.pub',
>     ],
>     require => Package['openssh-server'],
>     notify  => Service['sshd'],
>   }
>
> and put some blank default files in there, but I would much prefer to
> build the keys if they are not there, and I presume I need some puppet
> magic here :-/
>
> Any ideas?

Part of our server bootstrapping process is to copy over the ssh keys
to the puppetmaster after puppet has installed openssh-server.

As far as generating the keys, that should be pretty straightforward
using ssh-keygen.

-mz

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to