On Monday 20 March 2006 22:25, Grant <[EMAIL PROTECTED]> wrote about 
'[gentoo-user] Hosted server as distcc machine':
> Is there anything wrong with
> making a remote machine [a] distcc system?

Not really, but you do need to realize that distcc doesn't guarantee that 
jobs will be sent to the remote machines and will not prevent jobs from 
being run locally.  If there are not enough distcc hosts to support the 
number of jobs being run, or the network is down to 1 or more, or other 
such issues, you might end up having too many compiles being run locally.  
This applies even if you put something like localhost/2 in your distcc 
hosts -- when distcc runs out of hosts it unconditionally uses local 
compilation.

Also, distccd is a wide-open security hole: there's little to no 
restriction on what a client can run on the host, and AFAIK only 
ip/host-based restrictions on who can connect.  A few, well-placed IP 
packets with spoofed sources could theoretically result in a rooted box 
(depending on other security features like firewalls, syn cookies, 
restricted shells, chroot jails, and presence of local privilege 
escalation exploits).

It's probably better to use distcc over ssh, using an ssh-agent and PKI 
authentication.  That does involve giving shell access to an account, but 
you probably already have an account that will work. :)  Unfortunately, 
this removes the host's ability to limit simultaneous distcc jobs AFAIK.  
It also makes it quite a bit harder to distcc from cron, but most of the 
time that shouldn't be an issue.

-- 
"If there's one thing we've established over the years,
it's that the vast majority of our users don't have the slightest
clue what's best for them in terms of package stability."
-- Gentoo Developer Ciaran McCreesh
-- 
gentoo-user@gentoo.org mailing list

Reply via email to