Date:    Wed, 21 Jan 2009 12:52:00 +0100
From:    Honest Guvnor <[email protected]>
Subject: Fwd: rsh and firewall

On Wed, Jan 21, 2009 at 11:06 AM, Faye Gibbins
<[email protected]> wrote:

>  Yes rsh is a pain to setup. Please, please, please think about either:
>
> ssh

We are having some problems with ssh also. What we need is to have the
compute nodes passwordless to the host and each other. Unfortunately,
when we use ssh to connect from outside to the host and then onto a
node (there is no access to the nodes except via the host) the keys
setup for host+nodes do not work. Setting up sets of keys for all the
machines that might be used to access the host does not seem right. Is
there an rsh-type solution of just entries/keys for the host+nodes?

> or kerberosized rsh.

This is probably easier to accompish by modifying the PAM system-auth settings. Editing PAM will change password behaviour for rsh, ssh, console, etc. all at the same time.

On your compute nodes, in the file /etc/pam.d/system-auth change the line:
account     required      pam_unix.so
to:
account     required      pam_unix.so broken_shadow

This will accept a user login when they do not a have shadow entry (ie. no password, not even an empty one).
http://www.centos.org/docs/5/html/5.2/Deployment_Guide/s1-pam-sample-simple.html
http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/sag-pam_unix.html

You will still need a way for the compute nodes to be aware of usernames & uids (ie. /etc/passwd info).

This fix is from perceus, software to provision operating systems to compute nodes:
https://perceus.org/svn/perceus/1.3/scripts/share/scientific-linux-4.5-genchroot.sh

Reply via email to