The normal process startup mechanism for the ch_p4 device on networks is rsh. Use of rsh requires that certain permission be set up on the participating machines. On some networks it is undesirable to set permissions that way. The simplest alternative to the use of rsh is ssh (the secure shell). It can be used for secure distributed computing. It requires some setup, described here, but then usage is quite simple.
The exact set of instructions depend, unfortunately, on exactly which version of ssh you have installed.
Here is a set of steps that need to be done before version one of ssh will work properly with mpich. The changes for version two of ssh follow.
ssh-keygenThis will generate a private/public key pair. The private key will be saved in
~/.ssh/identityand the public key will be saved in
~/.ssh/identity.pub
cp /.ssh/identity.pub /.ssh/authorized_keysIf the machine you are connecting to does not share a common file system, then /.ssh/identity.pub should be copied over to the /.ssh/authorized_keys file of the machine you will be connecting to. ssh will insist that authorized_keys have its permissions set so that it is not group writable, so do
chmod go-rwx /.ssh/authorized_keysThis step avoids the need to enter your password each time you want to run a secure shell command.
ssh-agent $SHELL ssh-add
configure -rsh=ssh
- Make sure that the hosts listed in your util/machines/machine.xxxx are also listed in the /etc/ssh_known_hosts file on your network or your /.ssh/known_hosts file in your home directory.
- It is important that /tmp has permissions set to 03777, with root as owner and group 0.
- openssh has a -v flag which is very useful for tracking down handshaking problems.
Follow the instructions for Original SSH with the following changes: