On 19-06-2020 18:55, Mark Hahn wrote:
The host-based SSH authentication is a good idea, but only inside the cluster's security perimeter, and one should not trust computers external to the cluster nodes in this way.

Even more than that!  Hostbased allows you to define intersecting sets of
asymmetric trust.  For instance, usually symmetric trust among compute nodes,
and they trust login nodes.  But perhaps login nodes don't trust compute
nodes, but do trust each other.  And admin nodes don't trust anyone, but everyone trusts them.  If you have "equivalent" clusters (same LDAP, etc), then you might want login nodes of different clusters to trust each other.

So how do you configure that? Let me guess that you configure host-based SSH authentication on all nodes, but who trusts who is configured in the /etc/ssh/shosts.equiv file? Do you have any guidelines for how to configure such asymmetric trust?

The big win is that you entirely avoid the presence of private keys on the cluster.

We've used this widely in ComputeCanada since about 2003.

/Ole

Reply via email to