Software Archive
Read-only legacy content
17061 Discussions

setup MIC to MIC passwordless ssh

P__Robert
Beginner
759 Views

Hello,

Is it possible to setup MIC to MIC passwordless ssh?

When I ssh from one MIC to another:

root@mic0 ~]# ssh mic1
The authenticity of host 'mic1 (192.168.1.21)' can't be established.
ECDSA key fingerprint is -------------------------------------------------------
Are you sure you want to continue connecting (yes/no)? ^C
[root@mic0 ~]# 

What are the exact requirements for setup?

Just to be more clear, the requirement is that upon rebooting mpss, I would like to skip the "Are you sure you want to continue connecting?..." dialogue when issueing an ssh command from one MIC to another.

All MIC's, mic0-mic7, must meet this requirement for username "root"

More details:

Are you sure you want to continue connecting (yes/no)? 
Warning: Permanently added 'mic1,192.168.1.21' (ECDSA) to the list of known hosts.
[root@mic0 ~]# ssh mic1 ls -a     
.
..
.profile
.ssh
[root@mic0 ~]# 

 

Thanks,

Rob

 

sshMic2Mic.png

 

 

0 Kudos
1 Solution
JJK
New Contributor III
759 Views

when ssh'ing from one host to another the public key of that host has to be known to the other host.

When ssh'ing from one Phi to the next you'd need to add the ssh public key to the known_hosts file in the direc tory ~user/.ssh on the Phi itself. This can be done by adding the right file to /var/mpss/micN/home/<USER>/.ssh and then rebuilding the host image.

It also depends a bit on how you are doing user admin - if you use NFS based home directories for your Phi users then you can simply add it to the NFS home dir ~user/.ssh/authorized_keys file

 

View solution in original post

0 Kudos
1 Reply
JJK
New Contributor III
760 Views

when ssh'ing from one host to another the public key of that host has to be known to the other host.

When ssh'ing from one Phi to the next you'd need to add the ssh public key to the known_hosts file in the direc tory ~user/.ssh on the Phi itself. This can be done by adding the right file to /var/mpss/micN/home/<USER>/.ssh and then rebuilding the host image.

It also depends a bit on how you are doing user admin - if you use NFS based home directories for your Phi users then you can simply add it to the NFS home dir ~user/.ssh/authorized_keys file

 

0 Kudos
Reply