Linux

Home/Linux

CS Linux Labs

The CS Linux Labs are in FAB 88-10 aka Linux lab A (Penguin lab) and Fab 88-09 aka Linux lab B (Particle lab). Currently, the desktop systems in the labs are Dell computers running Ubuntu Bionic. The Penguin lab has 27 computers with Intel Core i7-4770 CPU @ 3.40GHz and 16GB of ram. The Particle [...]

2022-09-28T10:41:02-08:00June 13th, 2019|

Running X11 Applications Remotely

Running X11 Applications Remotely NOTE: We do not support the software required to do this on your home computer or laptop. This is simply a guide to help get you started on your way. If there is some application that you can not run remotely, you need to use one of the [...]

2022-12-07T15:43:30-08:00June 4th, 2019|

Using OpenVPN on Linux

Using OpenVPN on Linux VPN stands for Virtual Private Network. Once you are connected, all web site traffic will be directed through PSU's VPN hardware, and it will appear that you are connected physically to PSU's network. This will allow you to use private MCECS services that require a connection to the PSU [...]

2024-01-24T14:43:35-08:00April 11th, 2019|

Scanning in Ubuntu Linux

Scanning in Ubuntu Linux The CS Penguin Lab (FAB 88-10) has a scanner attached to ADELIE (its the computer that is not facing the board). These instructions assume you are using the default Gnome Shell. Step 1 After logging in to your account, press the linux start button or the button [...]

2019-04-11T14:30:30-08:00April 11th, 2019|

Linux Labs now using Kerberos Authentication

On December 27th, 2018, we switched CAT managed Linux workstations in our major computer labs to use an authentication/encryption system called Kerberos when accessing your files. This change is designed to significantly enhance the security of our file servers as they interact with these workstations. While most general users of these systems should not notice [...]

2018-12-28T02:46:28-08:00December 28th, 2018|

Kerberos FAQ

What’s different in a Kerberos environment? (Frequently Asked Questions) SSH keys will not work as expected when remotely logging in We recommend against using them for remote access to our lab and desktop Linux systems. (Note that SSH keys will continue to work for data center hosted remote access Linux [...]

2018-12-28T17:27:37-08:00December 17th, 2018|

Cron Jobs and Kerberos

Cron Jobs and Kerberos If at all possible run your cron jobs on server machines that don’t use Kerberos authentication. If your cron job expects access to something in your home directory, or some other NFS resource, (which is probably will) you need to make sure you have a valid kerberos ticket for [...]

2018-12-14T14:31:59-08:00December 12th, 2018|

SSH and Kerberos

SSH and Kerberos Machines that are configured to use Kerberos for authentication are also configured to use kerberos authentication (GSS API) and delegation for outgoing SSH connections to other MCECS machines by default. This means that if you are physically logged into a workstation machine and you SSH to another computer you won't [...]

2018-12-13T15:23:57-08:00December 12th, 2018|

Renewing Your Kerberos Ticket

Automatically Renewing Your Kerberos Ticket If you are a user who tends to stay logged into a workstation for days at a time it can important to make sure you Kerberos ticket doesn’t expire. If your Kerberos ticket expires, simulations or other programs you are running won’t be able to access/write to data [...]

2018-12-28T17:30:32-08:00December 12th, 2018|

Initializing Your Kerberos Ticket

Initializing Your Kerberos Ticket Whenever you log into a workstation that uses Kerberos authentication, you’ll automatically be issued a Kerberos ticket. You can see if you have a Kerberos ticket by running klist in a terminal. If you have a Kerberos ticket you’ll see something like:   Ticket cache: FILE:/tmp/krb5cc_9999_prBsnY Default principal: user@CECS.PDX.EDU [...]

2019-01-09T17:28:40-08:00December 12th, 2018|
Go to Top