On 21/07/2025 22:51, Steve Daniels wrote:

There are three different methods (two really) of allowing internode communications for the ssh commanding.

Centralized management where select nodes have one way root passwordless ssh access to all of the rest of the nodes and n-to-n where all nodes have access to all other nodes via passwordless ssh.


When the central administration mode was first introduced you still needed n-to-n ssh access or it all still fell apart despite being only able to issue "administration" commands from the central nodes.

From recollection a slew of what I would call "user" commands (such as changing an ACL on your *own* files for example) all stopped working unless the n-to-n was maintained.

I am not precluding that this had changed in the meantime, but once bitten twice shy as they say.

I still maintain reinventing the wheel, which will be a whole bunch of infrequently tested code paths is a really bad idea in the modern security threat environment.


JAB.

--
Jonathan A. Buzzard                         Tel: +44141-5483420
HPC System Administrator, ARCHIE-WeSt.
University of Strathclyde, John Anderson Building, Glasgow. G4 0NG


_______________________________________________
gpfsug-discuss mailing list
gpfsug-discuss at gpfsug.org
http://gpfsug.org/mailman/listinfo/gpfsug-discuss_gpfsug.org

Reply via email to