From the Journals of Tarn Barford
Apr 01, 2012
Arch Linux is a great distribution for a programming environment and there is an Arch AMI for Amazon EC2. I choose to run it on a Large EC2 instance in Tokyo, I downloaded the generated key-pair and copied its public domain name.
The EC2 security group needs to be setup to allow inbound requests to port 22 for SSH.
The key-pair is used to SSH into the instance as root. The permissions on the key file must be set so only the owner can read it. I also move keys to my ~/.ssh directory.
$ mv ~/Downloads/mykey.pem ~/.ssh/
$ chmod 400 ~/.ssh/mykey.pem
SSH into the public name using the key.
$ ssh -i ~/.ssh/mykey.pem root@[ec2-instance-name]
[root@ip-xx-xxx-xx-xx ~]$
Firstly the system should be updated with the Arch Linux package management tool.
[root@ec2]$ pacman -Syyu
It asked me something about a dependency conflict, I said yes. Things seem to be fine.
adduser
is an interactive tool which prompts for new user information and provides defaults where possible. A username and the defaults are fine for now. User passwords can be set with passwd
Great, users for everyone.
The SSH configuration doesn't allow for plain text passwords sent through the tunnel. This can be allowed by updating /etc/ssh/sshd_config
and setting PasswordAuthentication
to yes
. But SSH keys are better, use them.
The SSH daemon checks for the key in ~/.ssh/authorized_keys
. Put the users public key there.
[root@ec2]$ mkdir /home/username/.ssh
[root@ec2]$ mv pub-key /home/username/.ssh/authorized_keys
The user can now login, the -i
flag can be used if the default key is not used.
$ ssh username@[ec2-instance-name]
Privileged users should be allowed to perform actions as the root user.
This can be done by giving permission to the wheel
group and then adding users to the group.
These rules are in /etc/sudoers
, because the file is important there is a tool called visudo which checks for syntax errors before saving.
[root@ec2]$ visudo
The line that allows the wheel group to perform actions as the root needs to be uncommented.
%wheel ALL=(ALL) ALL
We can then add users we trust to the wheel group.
[root@ec2]$ gpasswd username wheel
The sudo package needs to be installed at sometime.
[root@ec2]$ pacman -S sudo
Now a user can connect and perform actions as root, we can prevent logging in remotely as root.
To do this we update /etc/ssh/sshd_config
and set PermitRootLogin
to no
.
We need to restart the SSH process for this to take effect.
[tarn@ec2]$ rc.d restart sshd
We will need heaps more, but here are some to get us started.
[tarn@ec2]$ sudo pacman -S vim git screen gcc erlang \
python mono openjdk6 nodejs v8 patch \
curl zlib readline libxml2 libxslt \
autoconf automake diffutils make \
libtool bison subversion
Installing packages requires root access as the packages install system wide, only users with permission to sudo will be permitted to do it.
To share a screen process, one user starts screen passing a socket name
[person1@ec2]$ screen -S hack-session
They then must enable multiuser by invoking screen with CTRL-a
and typing
:multiuser on
Finally they must explictly allow a user, again by invoke screen with CTRL-a
.
:acladd person2
The user person2
can now attach to the screen session
[person2@ec2]$ screen -x person1/hack-session
You can then even split your screen CTRL-S
and share two shells, perhaps Vim and a REPL? Awesome.
Note: When you allow someone to connect to your screen process you are effectively giving them permission to run as you. Unless you want to remotely pair on system administration, create an un-privleged user and use that to share a screen process.
With a shared remote programming environment I'll be able to pair with people I wouldn't otherwise. I'm nervious about pairing with programmers I know are awesome, but I also know it's a great way to learn, so lets bring it!
Comments
Top work Tarn!