Difference between revisions of "Turist"

From CSLabsWiki
Jump to: navigation, search
Line 37: Line 37:
 
|}
 
|}
  
==Getting an account==
+
===Getting an account===
  
 
Submit your SSH keys and preferred username to dunbarj@clarkson.edu
 
Submit your SSH keys and preferred username to dunbarj@clarkson.edu
  
  
==Policies==
+
===Policies===
  
 
Violating these following terms can permanently terminate your use of the VM
 
Violating these following terms can permanently terminate your use of the VM
Line 53: Line 53:
 
*Don't perform DoS attacks
 
*Don't perform DoS attacks
  
===Administrative crap===
+
==Administrative crap==
  
==Adding a User==
+
===Adding a User===
  
 
Add the user
 
Add the user

Revision as of 00:49, 1 November 2016

Turist
IP Address(es): 128.153.145.214
Contact Person: Jared Dunbar
Last Update: March 2016
VM Host (Physical): hydra
Host VM: Turist


Hostname: http://turist.cslabs.clarkson.edu
Operating system: Debian
LDAP Support: No
Development Status: Completed
Status: Running


Turist is for alumni who want to share files and other fun stuff, be able to vpn into COSI, etc.

The SSH daemon runs on Clarkson's zip code

Current Users

Username Real Name
alan Alan Beadle
cmesh Christian Mesh

Getting an account

Submit your SSH keys and preferred username to dunbarj@clarkson.edu


Policies

Violating these following terms can permanently terminate your use of the VM

Aside from the normal morals of using someone else's machine:

  • Don't distribute your private key. Only you are allowed to log into the server.
  • Don't fill up the disk, and if you do then it's your job to pester the other users to clean their shit
  • Don't fool with network resources (ever)
  • Don't perform DoS attacks

Administrative crap

Adding a User

Add the user

adduser <username>

Come up with some password and then forget it (it's not necessary to remember, the user can set it but it does nothing since you can't ssh over password (only public key) and there's no sudo for users.

Add their SSH public key

Log in as root, and make a file at /etc/ssh/authorized_keys/<username>

Edit that file to contain their public key, and then profit. (contact the alumnus)