-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSH experiences / braindump #659
Comments
Regarding point 9. This is indeed the place where we need to figure out what to do and what not to do.
We can probably clean this up quite a bit. If I comment out this code completely and don't tell SSHD to do anything special it seems to accept all connections and not add anything to known_hosts. This is the same behavour as setting It we set The alternative, Unfortunately, setting it to Additionally, the |
So this issue is a bit of a mess but I needed a way to record some strange things I noticed while preparing materials for a xenon tutorial https://github.com/xenon-middleware/xenon-tutorial/tree/2b00c8d7625cf2966fdfe7c3e2aaeb6046fd7823. With the below items, we at least have concrete things to follow up on. From this collection, we should probably spawn new, singular issues.
ssh config options not used xenon-docker-image's Dockerfile because ssh(d) uses the first option it finds in a file even when there are repeated entries, and we
echo
options at the bottom. E.g. https://github.com/xenon-middleware/xenon-docker-images/blob/a87f1ef876055e19cedcccf4bae4012db2953258/slurm-ssh/Dockerfile#L10-L13. I'd prefer to copy a completessh_config
file from the Docker context anyway, that way it's easier to see what the options are. Example setup here https://github.com/xenon-middleware/xenon-tutorial/tree/ed69661cdc7125ea15863fa2360fb8fd23309d10/containersdocker images for client side and server side, should be separate. e.g.
slurm-ssh
should be server side since it is a parent to all slurm images, but then the Dockerfile also has https://github.com/xenon-middleware/xenon-docker-images/blob/a87f1ef876055e19cedcccf4bae4012db2953258/slurm-ssh/Dockerfile#L10-L13ssh client docker image should have different configurations, for example
known_hosts
fileknown_hosts
file, with various types of entries in thereXenon does not respect certain combinations of configuration parameters, specifically when inpuit argument
knownHosts
isfalse
(see Notes xenon-tutorial#122), so by settingknownHosts
tofalse
I can disobey input parameterstricHostCheck
my
ssh
understandsstrictHostKeyChecking=ask
, xenon doesn'tin xenon, the config state is not assembled correctly from system config, user config, command line config
in xenon, you can't ask xenon what it thinks the current config state is, like you can with
ssh -G xenon@localhost
andsshd -T
in xenon, there is no way to control fallback behavior. ssh first tries public-private key, then interactive, then username-password (or something) this makes it more difficult to know that something is not working, and more difficult what is going wrong if you realize that something is going wrong
rethink options in
SSHUtil
xenon/src/main/java/nl/esciencecenter/xenon/adaptors/shared/ssh/SSHUtil.java
Lines 187 to 188 in c24fba2
useAgentForwarding
is not used and only in the waystricHostCheck
typo plus should bestrictHostKeyChecking
stricHostCheck
option is unused if I setuseKnownHosts
falseloadSSHConfig
ambiguous which SSHConfig you're talking about: system, user, commandline, or the combination of thesexenon-docker-images have multiple key pairs, would be better to have one per image, then you know how you got inside a container, or if it doesn't work, you know why (see https://github.com/xenon-middleware/xenon-docker-images/tree/07db6c0f12621e51bd109a5325fe08b1c0e9123f/slurm-ssh/.ssh)
docker images client side ssh has
authorized_keys
like https://github.com/xenon-middleware/xenon-docker-images/blob/a87f1ef876055e19cedcccf4bae4012db2953258/slurm-ssh/Dockerfile#L27, not sure that's needed if it is only clientxenon docker images (
slurm:17
image): not sure what the value ofPasswordAuthentication
is):and
seems to suggest password authentication is disabled by default. Stands to reason, since it
is not as secure as keypairs. However, if I do
sshd -T
, I seepasswordauthentication yes
. Not sure where that's coming from.The text was updated successfully, but these errors were encountered: