Am 13.09.2009 um 12:31 schrieb Leif Nixon:

<snip>
This is the way to go. All our systems are set up this way. Works just
fine. You just need a mechanism for maintaining host keys and
ssh_known_hosts. (And remember that this doesn't work for root - you
need separately set up ~root/.shosts and ~root/.ssh/known_hosts if you
want it.)

Oh, and DO NOT USE PASSPHRASE-LESS PRIVATE KEYS!

Do the Internet a service and scan your users' home directories for
passphrase-less private ssh keys. This is as easy as running

  # grep -L ENCRYPTED /home/*/.ssh/id_?sa

Delete all such keys that don't have a good reason for existence. (Yes,
we do so on all our systems.)

I agree. And to have it still convenient between multiple clusters I guide my students to use just one passphrase protected key and an ssh- agent in additions. There is nice Howto about it:

http://unixwiz.net/techtips/ssh-agent-forwarding.html

But: even with a passphrase the ssh-key should be protected as much as possible. Once someone has the private key, any offline brute- force to get the passphrase won't take long I fear. They could just try to recreate the public part of the key with: ssh-keygen -y which is completely offline, as this will also need the passphrase to be entered.

-- Reuti
_______________________________________________
Beowulf mailing list, Beowulf@beowulf.org sponsored by Penguin Computing
To change your subscription (digest mode or unsubscribe) visit 
http://www.beowulf.org/mailman/listinfo/beowulf

Reply via email to