SCIENTIFIC-LINUX-USERS Archives

October 2005

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Daniel Widyono <[log in to unmask]>
Reply To:
Daniel Widyono <[log in to unmask]>
Date:
Wed, 12 Oct 2005 23:00:39 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (16 lines)
> I wrote a simple script that users would run, to generate passwordless
> keys.
> In fact, the site I Was working with used a script to generate temporary
> keys which are used once only.
> Google for 'rocks' 'ssh' 'mpich' 'temporary' and I think you will find a
> script.

We have a user creation script which does this at account setup time.  It's a
pain when someone clobbers their authorized_keys file or their actual keys
for whatever reason (being human...).  Has anybody every used host based
authentication for purely cluster-internal SSH authorization, as opposed to
passwordless keys for each user, and would care to share their experience?

Regards,
Dan W.

ATOM RSS1 RSS2