strombrg at dcs.nac.uci.edu
Wed Jan 4 17:27:58 EST 2006
On Fri, 2005-12-30 at 09:35 +0100, Leif Nixon wrote:
> Skylar Thompson <skylar at cs.earlham.edu> writes:
> > For a variety of reasons, I recommend using ssh with passwordless
> > keys, rather than host authentication with rsh.
> I beg to differ. Passwordless keys are a really bad habit (except in
> very special circumstances like cron jobs - but then the key should be
> restricted in authorized_keys to allow a single command).
> Setting up hostbased authentication for ssh is much more appropriate
> for a cluster environment.
I'm not sure how many clusters out there, computational or otherwise,
have high security requirements, but if you're interested in maximizing
security, you're probably better off with RSA or DSA-based public key
authentication than something host based.
Aside from the fact that IP addresses can be spoofed, if you go pure
host-based, then anyone on the host in question can do what they need to
If you do go pure host-based auth, and you want to maximize security
given that requirement, then you might want to guard that one host very
Or am I missing the point somehow?
Beowulf mailing list, Beowulf at beowulf.org
To change your subscription (digest mode or unsubscribe) visit http://www.beowulf.org/mailman/listinfo/beowulf
More information about the Beowulf