home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
IRIX 6.5 Applications 1998 June
/
SGI IRIX 6.5 Applications 1998 June.iso
/
dist
/
arraysvcs.idb
/
usr
/
relnotes
/
arraysvcs
/
chA.z
/
chA
Wrap
Text File
|
1998-04-15
|
3KB
|
67 lines
- 1 -
1. _S_e_c_u_r_i_t_y__C_o_n_s_i_d_e_r_a_t_i_o_n_s
The array services daemon, arrayd(1M), runs as root. As
with other system services, if it is configured carelessly
it is possible for arbitrary and possibly unauthorized users
to disrupt or even damage a running system.
By default, most array commands are executed using the user,
group and project ID of either the user that issued the
original command, or else those of a fairly powerless user,
such as guest. When adding new array commands to
arrayd.conf, or modifying existing ones, always use the most
restrictive IDs possible in order to minimize trouble if a
hostile or careless user were to run that command. Avoid
adding commands that run with "more powerful" IDs (such as
user "root" or group "sys") than the user. If such commands
are necessary, analyze them carefully to ensure that an
arbitrary user would not be granted any more privileges than
expected, much the same as one would analyze a "setuid"
program.
In the default array services configuration, arrayd assumes
that a remote user will accurately identify itself when
making a request. In other words, if a request claims to be
coming from user "abc", arrayd will assume that it is in
fact from user "abc" and not somebody spoofing "abc". This
should be adequate for systems that are behind a network
firewall or otherwise protected from hostile attack, and in
which all the users inside the firewall are presumed to be
non-hostile. On systems where this is not the case (for
example, those that are attached to a public network, or
where individual machines otherwise cannot be trusted),
array services authentication should be used. When
authentication is enabled, all requests from remote systems
will be authenticated using a mechanism that involves
private keys that are known only to the super-users on the
local and remote systems. Requests originating on systems
that do not have these private keys will be rejected. For
more details, see the section on "Authentication
Information" in arrayd.conf(4).
arrayd does not support mapping user, group or project names
between two different namespaces; all members of an array
are assumed to share the same namespace for users, groups
and projects. Thus, if systems "A" and "B" are members of
the same array, then username "abc" on system A is assumed
to be the same user as username "abc" on system B. This is
most significant in the case of username "root".
Authentication should be used if necessary to prevent access
to an array by machines using a different namespace.