Changes between Version 4 and Version 5 of User Guide/Remote Access/SSH


Ignore:
Timestamp:
Oct 18, 2019, 1:00:42 AM (5 years ago)
Author:
msherman
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • User Guide/Remote Access/SSH

    v4 v5  
    279279 
    280280
    281 
    282 === If you deleted the "@internal1" key from your profile ===
     281=== Common SSH issues ===
     282==== If you deleted the "@internal1" key from your profile ====
    283283
    284284As long as you have at least one public key configured in your profile, use your SSH client to connect to {{{gw.orbit-lab.org}}} and run the following commands there. You do not need to make a reservation in the scheduler for this.
     
    299299
    300300The internal key should now be restored.
     301
     302
     303==== Common ssh options for nodes ====
     304
     305We'd like to do a few things for convenience:
     306
     3071. log into nodes as root by default
     3081. allow forwarding of X11 applications
     3091. Suppress annoying host key warnings
     310
     311First, log into any console, or gw.orbit-lab.org
     312
     313After logging in, create or modify the file at {{{~/.ssh/config}}}
     314
     315Add the following to the file
     316
     317{{{
     318Host sdr?-md* sdr?-s?-lg* srv?-co* srv?-lg* node?-* node??-*
     319  User root
     320  UserKnownHostsFile /dev/null
     321  StrictHostKeyChecking no
     322}}}
     323
     324* Host: The Host line matches common naming conventions for nodes within the testbed
     325* User: root is set to match the common default for baseline
     326* !UserKnownHostsFile: is set to /dev/null to prevent saving new host keys for nodes
     327* !StrictHostKeyChecking: disables the warning message. SSH complains when host keys for a dns name change. This is a useful security feature, but is inconvenient within the testbed, where the operating system on a trusted machine changes frequently. Do not set it as a wildcard default for public endpoints, or you will be vulnerable to spoofing or man in the middle attacks.
     328
     329
     330
     331
     332