Difference: PPDBastionHost (6 vs. 7)

Revision 72018-11-09 - ChrisBrew

 
META TOPICPARENT name="WebHome"
The PPD Linux and Windows systems are behind the RAL site firewall so for offsite access you need to either use the RAL PPTP VPN or use the PPD SSH Bastion host.

Access to the PPD SSH Bastion

Accounts on the PPD SSH bastion are separate from the standard PPD linux account and need to be requested from PPDITHelpdesk@stfc.ac.uk.

The Bastion host only supports ssh key authentication not passwords so you need to send us a copy of your public key. If you want to use ssh keys to log on to the PPD Linux machines or Windows Terminal Server please set up a separate key pair for that and use ssh-agent to manage them. We will occasionally compare authorized_key files.

Creating an ssh key pair.

ssh-keygen -t rsa [-C "Comment"] [-f output_keyfile] 

if you don't supply the "-f output_keyfile" this prompt you for the files to create, the default being ~/.ssh/id_rsa and ~/.ssh/id_rsa.pub. It will then prompt you for a passphrase to encrypt you private key, please choose a strong passphrase.

If you are logging in from a linux or OSX desktop/laptop you may be able to run ssh-add to load up your new ssh key into an "agent" that will save you having to enter the passphrase every time you log in. Instructions for using the ssh agent with PuTTY on the PPD Windows desktops can be found here.

Logging onto the PPD SSH Bastion

ssh [-i private_keyfile] <username>@&voyager.pp.rl.ac.uk 

If your ssh-keyfile is in the standard location or you are using an agent you can omit the -i option.

This will present you with a normal bash shell on the bastion host, from there you can ssh on to the PPD Linux systems or Windows Terminal Server. The home area is local to the bastion host but your PPD linux home area is available under /home/ppd/<username>.

If you use ssh-agent a useful way of simplifying this is to add the following section to your .ssh/config file

Host voyager
   Hostname              voyager.pp.rl.ac.uk
   ForwardAgent          yes
   ForwardX11            yes
   ControlMaster         auto
   ControlPath           /tmp/%r@%h:%p
   ServerAliveInterval   15
   ServerAliveCountMax   3
   ProxyCommand          none

Then create an alias such as:

alias bssh='ssh -o "ProxyCommand = ssh <your-bastion-username>@voyager nc %h %p 2> /dev/null"'

That will allow you to run bssh <host> to log into one of the PPD machines.

This also works with scp so you can also define:

alias bscp='scp -o "ProxyCommand = ssh <your-bastion-username>@voyager nc %h %p 2> /dev/null”’
Changed:
<
<
-- ChrisBrew - 2013-09-09
>
>
In Windows you can achieve the same first follow the SSHPUTTY instructions to set up pagent and make sure you can log into both voyager and the final target from RAL without needing a passphrase.
Added:
>
>
Then open the config to log into your target machine and open the Connection -> Proxy tab and set:
  • Proxy type: Local
  • Proxy hostname: voyager.pp.rl.ac.uk
  • Port: 22
  • Telnet command, or local proxy command: plink.exe -agent -l <username> %proxyhost -nc %host:%port

Save the config as target via voyager and test, you should get a login on your target machine.

-- ChrisBrew - 2013-11-09

 
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback