Hi,

Am 20.02.2010 um 00:11 schrieb Eugene Loh:

Okay, yes, setting SSH_AUTH_SOCK is the right thing to do, but this strikes me as clumsy. I'm trying to understand how things should be set up so that I don't have to take special action each time I log in. Do I do some .login/.logout magic?

Or, why not just go without a DSA passphrase? The passphrase only protects me from root, before whom I am rather powerless anyhow.

you mean, that root could use your ssh-key? When you are having an agent running, root can hijack the created socket in /tmp. A good explanation you can find here:

http://unixwiz.net/techtips/ssh-agent-forwarding.html

KDE and Gnome start the agent automatically, once you use ssh-add (sometimes the graphical ssh-askpass is missing and must be installed). I have somewhere a small script to recover a saved agent configuration once it was started even for non-graphical based sessions. I'll post it later.

But there is more to dicuss. Some even suggest to encrypt the ~/.ssh/ know_hosts file, so that noone would know where you used to log in once he intruded your account. But most likely it's in the bash history anyway, so there would be a HOSTIGNORE="ssh*:scp*" necessary in bash. And as a next step, any convenient setting in ~/.ssh/config can't be used to abbreviate the logins... But it's good to use passphrase anyway, although it can be cracked locally by an attempt to change it with `ssh-keygen -y` - no delay by failed login attempt, so it could be really fast...


I also suggest to follow the complete thread starting with:

http://ftp.beowulf.org/archive/2009-September/026424.html

from

http://ftp.beowulf.org/archive/2009-September/thread.html

which ended in using hostbased authentication inside a cluster.


Also, the OMPI FAQ says authorized_keys should have 644 protection. Out on the web, it appears people advise 600, which doesn't make sense to me since it just has public keys in it anyhow. (My head is starting to spin.)

Correct, 644 is fine.

-- Reuti


Kenneth Yoshimoto wrote:

After you start up ssh-agent once, check env for SSH_AUTH_SOCK

If you start a new session and the old ssh-agent is still running, try setting SSH_AUTH_SOCK.

I think there are more refined utilities out there to handle this situation...

On Fri, 19 Feb 2010, Eugene Loh wrote:

Date: Fri, 19 Feb 2010 13:19:13 -0800
From: Eugene Loh <eugene....@sun.com>
Reply-To: Open MPI Users <us...@open-mpi.org>
To: Open MPI Users <us...@open-mpi.org>
Subject: [OMPI users] password-less ssh

This is with regards to http://www.open-mpi.org/faq/? category=rsh#ssh-keys

It says to check if you have an ssh-agent running. How are you supposed to do that? I've tried "ps -u myusername | grep ssh- agent", but didn't know if that's the proper thing to do.

Also, it appears that I do *NOT* have an ssh-agent running automatically for me. How often do I have to start one up? It appears that if I start one up and log out and then log back in again, the old ssh-agent is still there but not usable. I have to start up a new one. So, do I have to start an ssh-agent each time I log in?

Or, I could use no DSA passphrase, but that seems to be frowned upon.


_______________________________________________
users mailing list
us...@open-mpi.org
http://www.open-mpi.org/mailman/listinfo.cgi/users

Reply via email to