On Friday, May 25, 2018 at 1:24:39 PM UTC-7, Volker Braun wrote:
>
> On Friday, May 25, 2018 at 7:02:19 PM UTC+2, Nils Bruin wrote:
>>
>> Since your approach requires the device to run ssh, a much more portable 
>> option is to run the jupyter server on the remote machine as well 
>> (listening on localhost) and use ssh to forward the relevant port so that a 
>> local browser can connect to it.
>>
>
> If only browsers had a cryptographically secure way of transferring web 
> pages ;-)
>

True, but in terms of attack service there is something to say for this 
approach. Since you let ssh take care of the identification and a big part 
of the authentication check, you're limiting the level to which jupyter has 
to do this securely. Since you're only exposing jupyter on localhost: 
ports, you only have to make sure that the local users each use their own 
port and are careful with their jupyter tokens or set a somewhat decent 
password to limit access to their jupyter server. It's a lot easier sell 
than letting jupyter(hub?) handle logins using regular usercredentials and 
then serve the respective homedirs and privileges on an internet-facing 
port. I can sell the localhost-with-ssh tunnelling to a sysadmin, but 
setting up a multi-user jupyter would draw frowns. A deployment with docker 
images would require even more commitment of sysadmin time and hardware. 
The advantage of ssh tunnelling is that you can make it work on a vanilla 
setup, with sage installed as a normal application (or even compiled and 
run by a user).

-- 
You received this message because you are subscribed to the Google Groups 
"sage-support" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sage-support+unsubscr...@googlegroups.com.
To post to this group, send email to sage-support@googlegroups.com.
Visit this group at https://groups.google.com/group/sage-support.
For more options, visit https://groups.google.com/d/optout.

Reply via email to