<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.clustermonkey.net/cdp/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Steve+vmwx</id>
		<title>Cluster Documentation Project - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.clustermonkey.net/cdp/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Steve+vmwx"/>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php/Special:Contributions/Steve_vmwx"/>
		<updated>2026-04-09T16:40:03Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.4</generator>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=2072</id>
		<title>Passwordless SSH (and RSH) Logins</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=2072"/>
				<updated>2006-12-14T23:20:26Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DISCLAIMER:''' Implementing any of these techniques will allow you to login to the target system without being prompted for a password. In all but one set of circumstances this is a very, very, very BAD thing. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''OpenSSH Public Key Authentication'''&lt;br /&gt;
&lt;br /&gt;
The info below comes from Robert G Brown (aka RGB) at Duke University email on the Beowulf list.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now, let's arrange it so that we can login to a remote host (also running sshd) without a password. Let's start by seeing if we can login to the remote host at all, I&amp;lt;with&amp;gt; a password:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rgb@lucifer|T:151&amp;gt;ssh lilith&lt;br /&gt;
The authenticity of host 'lilith (192.168.1.131)' can't be established.&lt;br /&gt;
RSA key fingerprint is 8d:55:10:15:8b:6c:64:65:17:00:a7:84:a3:35:9f:f6.&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
Warning: Permanently added 'lilith,192.168.1.131' (RSA) to the list of known hosts.&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So far, so good. Note that the FIRST time we remotely login, ssh will ask you to verify that the host you are connecting to is really that host. When you answer yes it will save its key fingerprint and use it thereafter to automatically verify that the host is who you think it is. This is one small part of the ssh security benefit. However, we had to enter a password to login. This is no big deal for a single host, but is a BIG deal if you have to do it 1024 times on a big cluster just to get pvm started up!&lt;br /&gt;
&lt;br /&gt;
To avoid this, we use the ssh-keygen command to generate a public/private ssh key pair of our very own:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rgb@lucifer|T:104&amp;gt;ssh-keygen -t rsa&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
Enter file in which to save the key (/home/rgb/.ssh/id_rsa):&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
Your identification has been saved in /home/rgb/.ssh/id_rsa.&lt;br /&gt;
Your public key has been saved in /home/rgb/.ssh/id_rsa.pub.&lt;br /&gt;
The key fingerprint is: c3:aa:6b:ba:35:57:95:aa:7b:45:48:94:c3:83:81:11&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This generates a default 1024 bit RSA key; alternatively we could have made a DSA key or increased or decreased the number of bits in the key (decreasing being a Bad Idea). Note that we used a blank passphrase; this will keep ssh from prompting us for a passphrase when we connect.&lt;br /&gt;
&lt;br /&gt;
A more secure option is to use a non-blank passphrase.  In this case, you will have to use a couple more ssh tools (once per session).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
guest@localhost$ ssh-agent $SHELL&lt;br /&gt;
guest@localhost$ ssh-add&lt;br /&gt;
Enter passphrase for /home/guest/.ssh/id_rsa: &lt;br /&gt;
Identity added: /home/guest/.ssh/id_rsa (/home/guest/.ssh/id_rsa)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If entering the passphrase once per session is annoying, then you should try [http://www.gentoo.org/proj/en/keychain/index.xml keychain], which will reuse ssh-agents across all of your sessions.  The associated IBM developerWorks articles are very nice introductions to openssh public key authentication. &lt;br /&gt;
&lt;br /&gt;
The last step is to create an authorized keys file in your ~/.ssh directory. If your home directory is NFS exported to all the nodes, then you are done; otherwise you'll also need to copy the I&amp;lt;entire .ssh directory&amp;gt; to all the hosts that don't already have it mounted. The following illustrates the steps and a test.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
rgb@lucifer|T:113&amp;gt;cd .ssh&lt;br /&gt;
rgb@lucifer|T:114&amp;gt;ls&lt;br /&gt;
id_rsa id_rsa.pub known_hosts&lt;br /&gt;
rgb@lucifer|T:115&amp;gt;cp id_rsa.pub authorized_keys&lt;br /&gt;
rgb@lucifer|T:116&amp;gt;cd ..&lt;br /&gt;
rgb@lucifer|T:118&amp;gt;scp -r .ssh lilith:&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
known_hosts 100% |*****************************| 231 00:00&lt;br /&gt;
id_rsa 100% |*****************************| 883 00:00&lt;br /&gt;
id_rsa.pub 100% |*****************************| 220 00:00&lt;br /&gt;
authorized_keys 100% |*****************************| 220 00:00&lt;br /&gt;
rgb@lucifer|T:120&amp;gt;ssh lilith&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that with the last ssh we logged into lilith with no password!&lt;br /&gt;
&lt;br /&gt;
ssh is really pretty easy to set up this way; if you read the man page(s) you can learn how to generate and add additional authorized keys and do fancier things with it, but many users will need no more than what we've done so far. A warning - it is a good idea to log into each host in your cluster one time after setting it up before proceeding further, to build up the known_hosts file so that you aren't prompted for each host the first time PVM starts up a virtual machine.&lt;br /&gt;
&lt;br /&gt;
[end]&lt;br /&gt;
&lt;br /&gt;
A closing note or two:&lt;br /&gt;
&lt;br /&gt;
For RedHat and derivatives, the permissions are quite fussy:&lt;br /&gt;
&lt;br /&gt;
chmod 644 ~/.ssh/auth*&lt;br /&gt;
&lt;br /&gt;
chmod 755 ~/.ssh &lt;br /&gt;
&lt;br /&gt;
When compiling / running MPI 1.2x remember either the &amp;quot;setenv P4_RSHCOMMAND ssh&amp;quot; or run configure with &amp;quot;-rsh=ssh&amp;quot; (it'll whinge that you should use the command line option - ignore it) &lt;br /&gt;
&lt;br /&gt;
Most Linux distro's are setup with some sensible default firewall settings. Remember to modify them so SSH is allowed in '''both''' directions!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''OpenSSH hostbased authentication'''&lt;br /&gt;
&lt;br /&gt;
A cluster adminstrator may want to save his users the trouble of setting up public keys themselves by enabling [http://www.omega.telia.net/vici/openssh/ hostbased authentication].  Keep in mind that if someone compromises your trusted host(s), then they will have comprimised your entire cluster. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RLOGIN and RSH'''&lt;br /&gt;
&lt;br /&gt;
There's a fair degree of implementation difference between distro's. The RedHat flavours and derivatives all seem to be vaguely similar. You always want the non-Kerberos version of the &amp;quot;R&amp;quot; utilites. Rather than producing the whole thing, here's a link to an articles that worked for the author:&lt;br /&gt;
&lt;br /&gt;
http://howto.x-tend.be/openMosixWiki/index.php/Enabling%20RSH/RLOGIN%20without%20a%20password%20%28even%20for%20root%21%29&lt;br /&gt;
&lt;br /&gt;
Here's the upstream URL too: http://howto.x-tend.be/openMosixWiki/index.php/ -&amp;gt; Stick &amp;quot;RSH&amp;quot; in the search box.&lt;br /&gt;
&lt;br /&gt;
In some respects the R utilites are quicker than their chatty SSH cousins. However, this becomes irrelevant after MPI starts up (that by design handles its own comms after the link is established). Also a lot of utilites leave their SSH connection open rather than rsh which they rerun on every request (eg. MOODSS).&lt;br /&gt;
&lt;br /&gt;
Seriously think about *why* you want RSH/RLOGIN. As you can see above, SSH isn't hard and (I'd argue) a bit easier!&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Cluster_Questions&amp;diff=1681</id>
		<title>Cluster Questions</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Cluster_Questions&amp;diff=1681"/>
				<updated>2006-02-22T23:51:44Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Enter Your Questions Here===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===When it Gets Answered It Will Go Here===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How do I enter a question?'''&lt;br /&gt;
&lt;br /&gt;
[http://agenda.clustermonkey.net/index.php/Special:Userlogin Register] and then return to this page. Click &amp;quot;Edit This Page&amp;quot; at the bottom of the page and enter you question like the one above.&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1680</id>
		<title>Passwordless SSH (and RSH) Logins</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1680"/>
				<updated>2006-02-22T03:49:45Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DISCLAIMER:''' Implemeting any of these techniques will allow you to login to the target system without being prompted for a password. In all but one set of circumstances this is a very, very, very BAD thing. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''SSH'''&lt;br /&gt;
&lt;br /&gt;
The info below comes from Robert G Brown (aka RGB) at Duke University email on the Beowulf list.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now, let's arrange it so that we can login to a remote host (also running sshd) without a password. Let's start by seeing if we can login to the remote host at all, I&amp;lt;with&amp;gt; a password:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:151&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
The authenticity of host 'lilith (192.168.1.131)' can't be established.&lt;br /&gt;
&lt;br /&gt;
RSA key fingerprint is 8d:55:10:15:8b:6c:64:65:17:00:a7:84:a3:35:9f:f6.&lt;br /&gt;
&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
&lt;br /&gt;
Warning: Permanently added 'lilith,192.168.1.131' (RSA) to the list of known hosts.&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So far, so good. Note that the FIRST time we remotely login, ssh will ask you to verify that the host you are connecting to is really that host. When you answer yes it will save its key fingerprint and use it thereafter to automatically verify that the host is who you think it is. This is one small part of the ssh security benefit. However, we had to enter a password to login. This is no big deal for a single host, but is a BIG deal if you have to do it 1024 times on a big cluster just to get pvm started up!&lt;br /&gt;
&lt;br /&gt;
To avoid this, we use the ssh-keygen command to generate a public/private ssh key pair of our very own:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:104&amp;gt;ssh-keygen -t rsa&lt;br /&gt;
&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
&lt;br /&gt;
Enter file in which to save the key (/home/rgb/.ssh/id_rsa):&lt;br /&gt;
&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
&lt;br /&gt;
Your identification has been saved in /home/rgb/.ssh/id_rsa.&lt;br /&gt;
&lt;br /&gt;
Your public key has been saved in /home/rgb/.ssh/id_rsa.pub.&lt;br /&gt;
&lt;br /&gt;
The key fingerprint is: c3:aa:6b:ba:35:57:95:aa:7b:45:48:94:c3:83:81:11&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This generates a default 1024 bit RSA key; alternatively we could have made a DSA key or increased or decreased the number of bits in the key (decreasing being a Bad Idea). Note that we used a blank passphrase; this will keep ssh from prompting us for a passphrase when we connect.&lt;br /&gt;
&lt;br /&gt;
The last step is to create an authorized keys file in your ~/.ssh directory. If your home directory is NFS exported to all the nodes, then you are done; otherwise you'll also need to copy the I&amp;lt;entire .ssh directory&amp;gt; to all the hosts that don't already have it mounted. The following illustrates the steps and a test.&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:113&amp;gt;cd .ssh&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:114&amp;gt;ls&lt;br /&gt;
&lt;br /&gt;
id_rsa id_rsa.pub known_hosts&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:115&amp;gt;cp id_rsa.pub authorized_keys&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:116&amp;gt;cd ..&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:118&amp;gt;scp -r .ssh lilith:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
known_hosts 100% |*****************************| 231 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa 100% |*****************************| 883 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa.pub 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
authorized_keys 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:120&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that with the last ssh we logged into lilith with no password!&lt;br /&gt;
&lt;br /&gt;
ssh is really pretty easy to set up this way; if you read the man page(s) you can learn how to generate and add additional authorized keys and do fancier things with it, but many users will need no more than what we've done so far. A warning - it is a good idea to log into each host in your cluster one time after setting it up before proceeding further, to build up the known_hosts file so that you aren't prompted for each host the first time PVM starts up a virtual machine.&lt;br /&gt;
&lt;br /&gt;
[end]&lt;br /&gt;
&lt;br /&gt;
A closing note or two:&lt;br /&gt;
&lt;br /&gt;
When compiling / running MPI 1.2x remember either the &amp;quot;setenv P4_RSHCOMMAND ssh&amp;quot; or run configure with &amp;quot;-rsh=ssh&amp;quot; (it'll whinge that you should use the command line option - ignore it) &lt;br /&gt;
&lt;br /&gt;
Most Linux distro's are setup with some sensible default firewall settings. Remember to modify them so SSH is allowed in '''both''' directions!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''RLOGIN and RSH'''&lt;br /&gt;
&lt;br /&gt;
There's a fair degree of implementation difference between distro's. The RedHat flavours and derivatives all seem to be vaguely similar. You always want the non-Kerberos version of the &amp;quot;R&amp;quot; utilites. Rather than producing the whole thing, here's a link to an articles that worked for the author:&lt;br /&gt;
&lt;br /&gt;
http://howto.x-tend.be/openMosixWiki/index.php/Enabling%20RSH/RLOGIN%20without%20a%20password%20%28even%20for%20root%21%29&lt;br /&gt;
&lt;br /&gt;
Here's the upstream URL too: http://howto.x-tend.be/openMosixWiki/index.php/ -&amp;gt; Stick &amp;quot;RSH&amp;quot; in the search box.&lt;br /&gt;
&lt;br /&gt;
In some respects the R utilites are quicker than their chatty SSH cousins. However, this becomes irrelevant after MPI starts up (that by design handles its own comms after the link is established). Also a lot of utilites leave their SSH connection open rather than rsh which they rerun on every request (eg. MOODSS).&lt;br /&gt;
&lt;br /&gt;
Seriously think about *why* you want RSH/RLOGIN. As you can see above, SSH isn't hard and (I'd argue) a bit easier!&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1679</id>
		<title>Passwordless SSH (and RSH) Logins</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_(and_RSH)_Logins&amp;diff=1679"/>
				<updated>2006-02-22T03:45:44Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DISCLAIMER:''' Implemeting any of these techniques will allow you to login to the target system without being prompted for a password. In all but one set of circumstances this is a very, very, very BAD thing. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''SSH'''&lt;br /&gt;
&lt;br /&gt;
The info below comes from Robert G Brown (aka RGB) at Duke University email on the Beowulf list.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now, let's arrange it so that we can login to a remote host (also running sshd) without a password. Let's start by seeing if we can login to the remote host at all, I&amp;lt;with&amp;gt; a password:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:151&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
The authenticity of host 'lilith (192.168.1.131)' can't be established.&lt;br /&gt;
&lt;br /&gt;
RSA key fingerprint is 8d:55:10:15:8b:6c:64:65:17:00:a7:84:a3:35:9f:f6.&lt;br /&gt;
&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
&lt;br /&gt;
Warning: Permanently added 'lilith,192.168.1.131' (RSA) to the list of known hosts.&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So far, so good. Note that the FIRST time we remotely login, ssh will ask you to verify that the host you are connecting to is really that host. When you answer yes it will save its key fingerprint and use it thereafter to automatically verify that the host is who you think it is. This is one small part of the ssh security benefit. However, we had to enter a password to login. This is no big deal for a single host, but is a BIG deal if you have to do it 1024 times on a big cluster just to get pvm started up!&lt;br /&gt;
&lt;br /&gt;
To avoid this, we use the ssh-keygen command to generate a public/private ssh key pair of our very own:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:104&amp;gt;ssh-keygen -t rsa&lt;br /&gt;
&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
&lt;br /&gt;
Enter file in which to save the key (/home/rgb/.ssh/id_rsa):&lt;br /&gt;
&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
&lt;br /&gt;
Your identification has been saved in /home/rgb/.ssh/id_rsa.&lt;br /&gt;
&lt;br /&gt;
Your public key has been saved in /home/rgb/.ssh/id_rsa.pub.&lt;br /&gt;
&lt;br /&gt;
The key fingerprint is: c3:aa:6b:ba:35:57:95:aa:7b:45:48:94:c3:83:81:11&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This generates a default 1024 bit RSA key; alternatively we could have made a DSA key or increased or decreased the number of bits in the key (decreasing being a Bad Idea). Note that we used a blank passphrase; this will keep ssh from prompting us for a passphrase when we connect.&lt;br /&gt;
&lt;br /&gt;
The last step is to create an authorized keys file in your ~/.ssh directory. If your home directory is NFS exported to all the nodes, then you are done; otherwise you'll also need to copy the I&amp;lt;entire .ssh directory&amp;gt; to all the hosts that don't already have it mounted. The following illustrates the steps and a test.&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:113&amp;gt;cd .ssh&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:114&amp;gt;ls&lt;br /&gt;
&lt;br /&gt;
id_rsa id_rsa.pub known_hosts&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:115&amp;gt;cp id_rsa.pub authorized_keys&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:116&amp;gt;cd ..&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:118&amp;gt;scp -r .ssh lilith:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
known_hosts 100% |*****************************| 231 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa 100% |*****************************| 883 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa.pub 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
authorized_keys 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:120&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that with the last ssh we logged into lilith with no password!&lt;br /&gt;
&lt;br /&gt;
ssh is really pretty easy to set up this way; if you read the man page(s) you can learn how to generate and add additional authorized keys and do fancier things with it, but many users will need no more than what we've done so far. A warning - it is a good idea to log into each host in your cluster one time after setting it up before proceeding further, to build up the known_hosts file so that you aren't prompted for each host the first time PVM starts up a virtual machine.&lt;br /&gt;
&lt;br /&gt;
[end]&lt;br /&gt;
&lt;br /&gt;
A closing note or two:&lt;br /&gt;
&lt;br /&gt;
When compiling / running MPI 1.2x remember either the &amp;quot;setenv P4_RSHCOMMAND ssh&amp;quot; or run configure with &amp;quot;-rsh=ssh&amp;quot; (it'll whinge that you should use the command line option - ignore it) &lt;br /&gt;
&lt;br /&gt;
Most Linux distro's are setup with some sensible default firewall settings. Remember to modify them so SSH is allowed in '''both''' directions!&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Limiting_MPI_(1.2x)_traffic_to_one_NIC&amp;diff=1678</id>
		<title>Limiting MPI (1.2x) traffic to one NIC</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Limiting_MPI_(1.2x)_traffic_to_one_NIC&amp;diff=1678"/>
				<updated>2006-02-22T03:36:54Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As an example, say you want to run your nodes with a FastEther port for the admin and reporting functions but leave the GigaEther for the MPI traffic. &lt;br /&gt;
&lt;br /&gt;
IP addresses are setup accordingly and they have their own host names. eg. borg1 is the GigaEther (eth1) while borg1_m (eth0) is the &amp;quot;management&amp;quot; interface. Now, if you don't tell MPI that there's a difference then it's going reach out and touch the machines with eth0. &lt;br /&gt;
&lt;br /&gt;
To limit the MPI traffic to a specific interface you need to tell it which interface to use. A bit if string work in your mpirun.args file does the trick.&lt;br /&gt;
&lt;br /&gt;
In this case:&lt;br /&gt;
&lt;br /&gt;
MPI_HOST=`hostname | sed &amp;quot;s/_m//&amp;quot;`&lt;br /&gt;
&lt;br /&gt;
This slices the &amp;quot;_m&amp;quot; off the end of the hostname.&lt;br /&gt;
&lt;br /&gt;
(thanks to Reuti at the Uni of Marburg, Germany from the Beowulf email list)&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Limiting_MPI_(1.2x)_traffic_to_one_NIC&amp;diff=1677</id>
		<title>Limiting MPI (1.2x) traffic to one NIC</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Limiting_MPI_(1.2x)_traffic_to_one_NIC&amp;diff=1677"/>
				<updated>2006-02-22T03:35:22Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As an example, say you run your nodes with a FastEther port for the admin and reporting functions and leave the GigaEther for the MPI traffic. &lt;br /&gt;
&lt;br /&gt;
IP addresses are setup accordingly and they have their own host names. eg. borg1 is the GigaEther (eth1) while borg1_m (eth0) is the &amp;quot;management&amp;quot; interface. Now, if you don't tell MPI that there's a difference then it's going reach out and touch the machines with eth0. &lt;br /&gt;
&lt;br /&gt;
To limit the MPI traffic to a specific interface you need to tell it which interface to use. A bit if string work in your mpirun.args file does the trick.&lt;br /&gt;
&lt;br /&gt;
In this case:&lt;br /&gt;
&lt;br /&gt;
MPI_HOST=`hostname | sed &amp;quot;s/_m//&amp;quot;`&lt;br /&gt;
&lt;br /&gt;
This slices the &amp;quot;_m&amp;quot; off the end of the hostname.&lt;br /&gt;
&lt;br /&gt;
(thanks to Reuti at the Uni of Marburg, Germany from the Beowulf email list)&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Tuning_Intel_e1000_NICs&amp;diff=1676</id>
		<title>Tuning Intel e1000 NICs</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Tuning_Intel_e1000_NICs&amp;diff=1676"/>
				<updated>2006-02-22T03:30:02Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Switch off Interupt Throttle Rate (ITR) when loading the module. Try adding the following line to your modules.conf (or modprobe.conf if 2.6):&lt;br /&gt;
&lt;br /&gt;
options e1000 InterruptThrottleRate=0,0&lt;br /&gt;
&lt;br /&gt;
Use 0,0,0,0 of 2x NICs&lt;br /&gt;
&lt;br /&gt;
(Thanks to Peter Kjellstrom at the Nation Computing Centre, Sweden - from the Beowulf email list)&lt;br /&gt;
&lt;br /&gt;
All the magic options and generally good support info from Intel here: &lt;br /&gt;
http://support.intel.com/support/network/sb/CS-009209.htm&lt;br /&gt;
&lt;br /&gt;
If you have e1000 cards you might also check out the GAMMA project for a non-TCP/IP stack (recently updated with 2.6.x kernel and amd64 x86-64 support):&lt;br /&gt;
http://www.disi.unige.it/project/gamma/&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Tuning_Intel_e1000_NICs&amp;diff=1675</id>
		<title>Tuning Intel e1000 NICs</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Tuning_Intel_e1000_NICs&amp;diff=1675"/>
				<updated>2006-02-22T03:26:34Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Switch off Interupt Throttle Rate (ITR) when loading the module. Try adding the following line to your modules.conf (or modprobe.conf if 2.6):&lt;br /&gt;
&lt;br /&gt;
options e1000 InterruptThrottleRate=0,0&lt;br /&gt;
&lt;br /&gt;
Use 0,0,0,0 of 2x NICs&lt;br /&gt;
&lt;br /&gt;
(Thanks to Peter Kjellstrom at the Nation Computing Centre, Sweden - from the Beowulf email list)&lt;br /&gt;
&lt;br /&gt;
All the magic options and generally good support info from Intel here: &lt;br /&gt;
http://support.intel.com/support/network/sb/CS-009209.htm&lt;br /&gt;
&lt;br /&gt;
If you want to go exotic, check out the Gamma project for a non-TCP/IP stack (recently updated with 2.6.x kernel and amd64 x86-64 support):&lt;br /&gt;
http://www.disi.unige.it/project/gamma/&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Cluster_How-To%27s&amp;diff=1674</id>
		<title>Cluster How-To's</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Cluster_How-To%27s&amp;diff=1674"/>
				<updated>2006-02-22T03:21:45Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[Passwordless SSH (and RSH) Logins]]&lt;br /&gt;
* [[Tuning Intel e1000 NICs]]&lt;br /&gt;
* [[Limiting MPI (1.2x) traffic to one NIC]]&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Cluster_How-To%27s&amp;diff=1673</id>
		<title>Cluster How-To's</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Cluster_How-To%27s&amp;diff=1673"/>
				<updated>2006-02-22T03:20:10Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* [[Passwordless SSH (and RSH) Logins]]&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_Logins&amp;diff=1672</id>
		<title>Passwordless SSH Logins</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Passwordless_SSH_Logins&amp;diff=1672"/>
				<updated>2006-02-22T03:17:23Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DISCLAIMER''': Implemeting any of these techniques will allow you to login to the target system without being prompted for a password. In all but one set of circumstances this is a very, very, very '''BAD''' thing. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''SSH'''&lt;br /&gt;
&lt;br /&gt;
The info below comes from an RGB (Robert G Brown) at Duke Uni, USA, posting on the Beowulf list.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now, let's arrange it so that we can login to a remote host (also running sshd) without a password. Let's start by seeing if we can login to the remote host at all, I&amp;lt;with&amp;gt; a password:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:151&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
The authenticity of host 'lilith (192.168.1.131)' can't be established.&lt;br /&gt;
&lt;br /&gt;
RSA key fingerprint is 8d:55:10:15:8b:6c:64:65:17:00:a7:84:a3:35:9f:f6.&lt;br /&gt;
&lt;br /&gt;
Are you sure you want to continue connecting (yes/no)? yes&lt;br /&gt;
&lt;br /&gt;
Warning: Permanently added 'lilith,192.168.1.131' (RSA) to the list of known hosts.&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So far, so good. Note that the FIRST time we remotely login, ssh will ask you to verify that the host you are connecting to is really that host. When you answer yes it will save its key fingerprint and use it thereafter to automatically verify that the host is who you think it is. This is one small part of the ssh security benefit. However, we had to enter a password to login. This is no big deal for a single host, but is a BIG deal if you have to do it 1024 times on a big cluster just to get pvm started up!&lt;br /&gt;
&lt;br /&gt;
To avoid this, we use the ssh-keygen command to generate a public/private ssh key pair of our very own:&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:104&amp;gt;ssh-keygen -t rsa&lt;br /&gt;
&lt;br /&gt;
Generating public/private rsa key pair.&lt;br /&gt;
&lt;br /&gt;
Enter file in which to save the key (/home/rgb/.ssh/id_rsa):&lt;br /&gt;
&lt;br /&gt;
Enter passphrase (empty for no passphrase):&lt;br /&gt;
&lt;br /&gt;
Enter same passphrase again:&lt;br /&gt;
&lt;br /&gt;
Your identification has been saved in /home/rgb/.ssh/id_rsa.&lt;br /&gt;
&lt;br /&gt;
Your public key has been saved in /home/rgb/.ssh/id_rsa.pub.&lt;br /&gt;
&lt;br /&gt;
The key fingerprint is: c3:aa:6b:ba:35:57:95:aa:7b:45:48:94:c3:83:81:11&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This generates a default 1024 bit RSA key; alternatively we could have made a DSA key or increased or decreased the number of bits in the key (decreasing being a Bad Idea). Note that we used a blank passphrase; this will keep ssh from prompting us for a passphrase when we connect.&lt;br /&gt;
&lt;br /&gt;
The last step is to create an authorized keys file in your ~/.ssh directory. If your home directory is NFS exported to all the nodes, then you are done; otherwise you'll also need to copy the I&amp;lt;entire .ssh directory&amp;gt; to all the hosts that don't already have it mounted. The following illustrates the steps and a test.&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:113&amp;gt;cd .ssh&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:114&amp;gt;ls&lt;br /&gt;
&lt;br /&gt;
id_rsa id_rsa.pub known_hosts&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:115&amp;gt;cp id_rsa.pub authorized_keys&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:116&amp;gt;cd ..&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:118&amp;gt;scp -r .ssh lilith:&lt;br /&gt;
&lt;br /&gt;
rgb@lilith's password:&lt;br /&gt;
&lt;br /&gt;
known_hosts 100% |*****************************| 231 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa 100% |*****************************| 883 00:00&lt;br /&gt;
&lt;br /&gt;
id_rsa.pub 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
authorized_keys 100% |*****************************| 220 00:00&lt;br /&gt;
&lt;br /&gt;
rgb@lucifer|T:120&amp;gt;ssh lilith&lt;br /&gt;
&lt;br /&gt;
rgb@lilith|T:101&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note that with the last ssh we logged into lilith with no password!&lt;br /&gt;
&lt;br /&gt;
ssh is really pretty easy to set up this way; if you read the man page(s) you can learn how to generate and add additional authorized keys and do fancier things with it, but many users will need no more than what we've done so far. A warning - it is a good idea to log into each host in your cluster one time after setting it up before proceeding further, to build up the known_hosts file so that you aren't prompted for each host the first time PVM starts up a virtual machine.&lt;br /&gt;
&lt;br /&gt;
[end]&lt;br /&gt;
&lt;br /&gt;
A closing note or two:&lt;br /&gt;
&lt;br /&gt;
When compiling / running MPI 1.2x remember either the &amp;quot;setenv P4_RSHCOMMAND ssh&amp;quot; or run configure with &amp;quot;-rsh=ssh&amp;quot; This means you don't have to worry about it from then on.&lt;br /&gt;
&lt;br /&gt;
Most Linux distro's are setup with some sensible default firewall settings. Remember to modify them so SSH is allowed in ''both'' directions!&lt;br /&gt;
&lt;br /&gt;
'''RLOGIN and RSH'''&lt;br /&gt;
&lt;br /&gt;
For what is an insecure process, using the &amp;quot;R&amp;quot; untilites is truly evil. There's a fair degree of implementation difference between distro's too. The RedHat flavours and derivatives all seem to be vaguely similar. Regardless, you're aiming for the non-Kerberos version of the &amp;quot;R&amp;quot; utilites. &lt;br /&gt;
&lt;br /&gt;
Rather than repeast the whole process, this procedure has worked for the author:&lt;br /&gt;
http://howto.x-tend.be/openMosixWiki/index.php/Enabling%20RSH/RLOGIN%20without%20a%20password%20%28even%20for%20root%21%29&lt;br /&gt;
From here:&lt;br /&gt;
http://howto.x-tend.be/openMosixWiki/index.php/&lt;br /&gt;
&lt;br /&gt;
A couple of comments... In some respects the R utilites are quicker than their chatty SSH cousins. However, this becomes irrelevant after MPI starts up (that by design handles its own comms after the link is established). Also a lot of utilites leave their SSH connection open rather than rsh which they rerun on every request (eg. MOODSS).&lt;br /&gt;
&lt;br /&gt;
Seriously think about *why* you want RSH/RLOGIN. As you can see above, SSH isn't hard and (I'd argue) a bit easier!&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Administration&amp;diff=1664</id>
		<title>Administration</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Administration&amp;diff=1664"/>
				<updated>2006-02-21T01:57:19Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*[http://www.csm.ornl.gov/torc/C3/index.html C3 (Cluster Command and Control)] A set of command line tools for typical cluster tasks.&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Administration&amp;diff=1663</id>
		<title>Administration</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Administration&amp;diff=1663"/>
				<updated>2006-02-21T01:54:34Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*[http://www.csm.ornl.gov/torc/C3/index.html C3 (Cluster Command and Control)]&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Parallel_Tools&amp;diff=1662</id>
		<title>Parallel Tools</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Parallel_Tools&amp;diff=1662"/>
				<updated>2006-02-21T01:52:10Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;*[http://www.csm.ornl.gov/torc/C3/index.html C3 (Cluster Command and Control)]&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Other&amp;diff=1661</id>
		<title>Other</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Other&amp;diff=1661"/>
				<updated>2006-02-21T01:45:41Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Monitoring&lt;br /&gt;
*[http://ganglia.sourceforge.net/ Ganglia]&lt;br /&gt;
&lt;br /&gt;
*[http://http://moodss.sourceforge.net/ MOODSS]&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	<entry>
		<id>https://www.clustermonkey.net/cdp/index.php?title=Talk:Cluster_Benchmarking_Packages&amp;diff=1660</id>
		<title>Talk:Cluster Benchmarking Packages</title>
		<link rel="alternate" type="text/html" href="https://www.clustermonkey.net/cdp/index.php?title=Talk:Cluster_Benchmarking_Packages&amp;diff=1660"/>
				<updated>2006-02-21T01:29:11Z</updated>
		
		<summary type="html">&lt;p&gt;Steve vmwx: Observation: It seems HINT has disappeared?!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;It seems HINT has disappeared?!&lt;br /&gt;
&lt;br /&gt;
It used to be at:&lt;br /&gt;
http://www.scl.ameslab.gov/HINT/&lt;br /&gt;
&lt;br /&gt;
Cheers&lt;br /&gt;
Steve&lt;/div&gt;</summary>
		<author><name>Steve vmwx</name></author>	</entry>

	</feed>