I took a few of the points from this thread and updated the rsh faq entry (I almost fell out of my chair when I saw "lamboot" and "recon" still listed in that entry -- yoinks!). More updates would be greatly appreciated; could you send a diff against:
http://svn.open-mpi.org/svn/ompi-www/trunk/faq/rsh.inc On Feb 20, 2010, at 6:14 PM, Mark Hahn wrote: > > Okay, yes, setting SSH_AUTH_SOCK is the right thing to do, but this strikes > > me as clumsy. > > normally, you should run ssh-agent only on the machine where you sit. > it operates until you logout (you can also tell it to discard keys). > ssh-agent is normally part if your X startup sequence, so that all > terminals/etc inherit SSH_AUTH_SOCK and can do agent-based operations. > > > I'm trying to understand how things should be set up so that I > > don't have to take special action each time I log in. Do I do some > > .login/.logout magic? > > no, that would be very clumsy. > > > Or, why not just go without a DSA passphrase? The passphrase only protects > > me from root, before whom I am rather powerless anyhow. > > unencrypted keys are the moral equivalent of putting your password > into a file, in the clear. anyone who gains access to the file _owns_ > your accounts. > > > Also, the OMPI FAQ says authorized_keys should have 644 protection. Out on > > the web, it appears people advise 600, which doesn't make sense to me since > > it just has public keys in it anyhow. (My head is starting to spin.) > > it shouldn't be 644, since there's no reason for unrelated users to know > what keys permit login to your account. the answer is also wrong about > permissions for home and .ssh directories: there's no ssh reason for > either to be readable by group or other. what ssh is most picky about > is that it doesn't want ~, .ssh or .ssh/authorized_keys to be writable, > even by group. that is, no one but the user should be able to alter > what keys permit login. but I can't think of any reason to permit > anyone, even in your group, to read .ssh, either. > > >>> This is with regards to http://www.open-mpi.org/faq/?category=rsh#ssh-keys > > this page is not wonderful. > > a pretty common structure for clusters is that both login and compute nodes > are in the same administrative domain. that is, the same definition of valid > users, shared home directory, etc. as such, the most robust, least-effort > use of ssh is to make the compute nodes trust (via hostbased shosts.equiv) > the login nodes. > > >>> Also, it appears that I do *NOT* have an ssh-agent running automatically > >>> for me. How often do I have to start one up? It appears that if I start > > many desktop distos will start ssh-agent automatically - for instance, > .Xclients might do > exec ssh-agent startkde > (this means that X starts ssh-agent as a parent to your window manager, > the main point of which is that the WM and all the apps it starts will > inherit your SSH_AUTH_SOCK setting. you'll want to run ssh-add as well > to actually provide the agent with keys. when you logout, the agent > goes away as it should. > > >>> one up and log out and then log back in again, the old ssh-agent is still > > ssh-agent should run on your desktop, since you fundamentally must trust > the machine you sit at. you should avoid starting a remote ssh-agent > (and should avoid agent forwarding if possible.) > > >>> there but not usable. I have to start up a new one. So, do I have to > >>> start an ssh-agent each time I log in? > >>> > >>> Or, I could use no DSA passphrase, but that seems to be frowned upon. > > it's just hazardous. if the unencrypted private key file never leaves > your desktop, it's not entirely stupid, but putting an unencrypted priv key > on remote machine or fileserver is just asking to be owned. (though it is > useful to note that the authorized_keys file format can express some pretty > powerful restrictions on how the key can be used - only from certain hosts, > only to do a certain command, etc.) > > regards, mark hahn. > _______________________________________________ > users mailing list > us...@open-mpi.org > http://www.open-mpi.org/mailman/listinfo.cgi/users > -- Jeff Squyres jsquy...@cisco.com For corporate legal information go to: http://www.cisco.com/web/about/doing_business/legal/cri/