[Orca-checkins] rev 262 - trunk/orca

Blair Zajac blair at orcaware.com
Tue Oct 7 10:50:08 PDT 2003


Author: blair
Date: Tue Oct  7 10:49:43 2003
New Revision: 262

Modified:
   trunk/orca/FAQ   (contents, props changed)
Log:
* FAQ:
  Add two more questions regarding NFS vs rsync, rsh vs ssh, and how
    to set up ssh securely.
  Set 'svn:keywords' to 'HeadURL LastChangedBy LastChangedDate
    LastChangedRevision' and use them.  Remove the manually maintained
    document version.


Modified: trunk/orca/FAQ
==============================================================================
--- trunk/orca/FAQ	(original)
+++ trunk/orca/FAQ	Tue Oct  7 10:49:43 2003
@@ -3,7 +3,10 @@
 
 Please email submissions to the FAQ to orca-users at orcaware.com.
 
-Version: 1.13 Nov 7, 2002.
+# $HeadURL$
+# $LastChangedDate$
+# $LastChangedBy$
+# $LastChangedRevision$
 
 General
 -------
@@ -14,6 +17,11 @@
   1.3) Why are there random characters at the end of my HTML and GIF
        or PNG images names, i.e.
        o_host3_disk_runp_c0t6d0...disk_runp_c-4QyP2ziXlrwXj8eG_n_A.html?
+  1.4) What should I use, NFS or rsync, to get my data from my clients
+       to the Orca server?  Should I push my data to the server from
+       the clients or have my server pull my data?
+  1.5) How should I set up ssh access securely without entering a
+       password everytime a process needs to contact a remote system?
 
 Warning Messages
 ----------------
@@ -118,6 +126,76 @@
        filename, trim the filename down and insert the MD5 into the
        short filename, which will guarantee uniqueness.
 
+  1.4) What should I use, NFS or rsync, to get my data from my clients
+       to the Orca server?  Should I push my data to the server from
+       the clients or have my server pull my data?
+
+       [Answer written by Sean O'Neill <sean at seanoneill.info>.]
+
+       Yeah, NFS is a total pain for more reasons than just security.
+
+       rsync is the way to go.  By default, it uses ssh as it's
+       transport application vs. rsh.  Don't use rsh for the obvious
+       reasons.
+
+       But you need to really think about what this means in regards
+       to security.  First, your security group is probably going to
+       be nervous about anything that allows for unattended
+       password-less access between servers.  But you also need to
+       figure out if you want to PUSH or PULL your Orca data.
+
+       If you have a Orca server that ssh's into the remote systems
+       and rsync's down the data (e.g. PULL), this one machine would
+       have ssh access to LOTS of other systems and would probably
+       make any security group very nervous about that machine.
+
+       If you have the remote systems rsync their data to the Orca
+       server (e.g. PUSH), then you have lots of other machines with
+       ssh access to ONE system.  This generally makes security a
+       /little/ less nervous.
+
+       Some folks on the list have multiple Orca servers because of
+       the system resources required by Orca.  Its a CPU/memory hog at
+       times.  Also, pushing data into a box is generally an
+       asynchronous activity (from the Orca server's point of view) so
+       it will take in as many as the box will support.
+
+       If the Orca server is PULLING data, you need some script to
+       keep track of what systems to pull data from, have logic to
+       make it less serial to get the data down faster, etc etc -
+       e.g. its more of a headache IMHO.
+
+  1.5) How should I set up ssh access securely without entering a
+       password everytime a process needs to contact a remote system?
+
+       To get ssh working, use key authentication.  One easy way to
+       use key authentication is to use the keychain tool at
+
+       http://www.gentoo.org/proj/en/keychain.xml
+
+       The first keychain article introduces the concepts behind
+       RSA/DSA key authentication and shows you how to set up
+       primitive (with passphrase) RSA/DSA authentication:
+
+       http://www-106.ibm.com/developerworks/library/l-keyc.html
+
+       The second article shows you how to use keychain to set up
+       secure, password-less ssh access in an extremely convenient
+       way.  keychain also provides a clean, secure way for cron jobs
+       to take advantage of RSA/DSA keys without having to use
+       insecure unencrypted private keys.
+
+       http://www-106.ibm.com/developerworks/linux/library/l-keyc2/
+
+       A third keychain article shows you how to use ssh-agent's
+       authentication forwarding mechanism.
+
+       http://www-106.ibm.com/developerworks/linux/library/l-keyc3/
+
+       Even with these methods, when a system reboots, a person will
+       need to manually log into the system, su into the account, run
+       keychain and enter the passphrase to unlock the RSA/DSA keys.
+
 Warning Messages
 ----------------
 



More information about the Orca-checkins mailing list