A Technical Summary
Total Page:16
File Type:pdf, Size:1020Kb
A Technical Summary Table A.1. Kerberos administrative ACL (MIT) Allow Deny Operation a A Add principals or policies d D Delete principals or policies m M Modify principals or policies c C Change passwords i I Inquiry the database l L List principals or policies s S Set key for principals * or x Allow all privileges Table A.2. Kerberos kadmin password policies (MIT) Option Meaning -history Minimum count of unusable old passwords -maxlife Maximum allowed lifetime -minclasses Minimum character classes -minlength Minimum password length -minlife Minimum lifetime 380 A Technical Summary Table A.3. LDAP access control list levels Level Privilege Coding Explanation none =0 No access at all auth =x Permits authentication attempt compare =cx Permits comparison search =scx Permits search filter application read =rscx Permits search result inspection write =wrscx Permits modification or deletion Table A.4. The OpenAFS access control list attributes Permission Meaning l List contents (lookup) i Create new files or directories (insert) d Delete files or directories a Change ACL attributes of directories (administer) r Read contents of files w Modify contents of files (write) k Lock files for reading read Equivalent to rl write Equivalent to rlidwk (no administrative rights) all Equivalent to rlidwka none Remove all ACL permissions Table A.5. The OpenAFS @sys names (excerpt) @sys Architecture alpha dux40 Digital UNIX 4 on an Alpha alpha dux50 Digital UNIX 5 on an Alpha i386 linux24 Linux Kernel 2.4 on Intel and compatible i386 linux26 Linux Kernel 2.6 on Intel and compatible i386 nt40 Microsoft Windows NT and later on Intel and compatible ppc darwin70 Apple MacOS X 10.3 on a PowerPC Macintosh ppc darwin80 Apple MacOS X 10.4 on a PowerPC Macintosh ppc darwin90 Apple MacOS X 10.5 on a PowerPC Macintosh rs aix52 IBM AIX 5.2 on a pSeries rs aix53 IBM AIX 5.3 on a pSeries sgi 65 SGI Irix 6.5 on a MPIS x86 darwin80 Apple MacOS X 10.4 on an Intel Macintosh x86 darwin90 Apple MacOS X 10.5 on an Intel Macintosh A Technical Summary 381 Table A.6. New OpenAFS extensions (excerpt) Command Option or Subcommand Comment afsd -afsdb DB lookup in DNS -backuptree Prefer backup volumes -dynroot Construct root dynamically -fakestat Avoid blocking ls for cross-cell mounts -fakestat-all Avoid blocking ls for all mounts -nomount Do not mount /afs fs getcalleraccess Show context permissions getcrypt Show encryption flag getfid Show file location listaliases Show cell aliases newalias Set new cell alias rxstatpeer Rx peer statistics rxstatproc Rx process statistics setcbaddr Set call back address setcrypt Set encryption flag vos changeloc Set new RW location clone Make a volume clone convertROtoRW Convert RO volume to RW copy Make a volume copy offline Set volume offline (hidden from help) online Set volume online (hidden from help) setfields Set information fields shadow Make a shadow volume size Show size information Table A.7. OpenAFS 1.4.2 characteristics (excerpt) Feature Value Limitation Access Control List Maximum 20 entries per directory BOS Server Optionally restricted mode Cache Size Gigabyte order of magnitude possible Data Encryption Optionally with fcrypt() Directory Entries For short file names maximal about 64000 Clone DB Servers Together with database servers, up to 20 Database Servers Minimum 1, recommended 3 or 5, maximum 8 File Server Type namei, iname, optional accelerated start File Size More than 2GB possible (for Windows in 1.5 series) Group Membership Optionally other groups allowed Kerberos Support Moving from Kerberos IV to V Partitions Up to 255 /vicepX per file server Size Unit Kilobyte Time Skew Allowed Up to 10 minutes Volume Name Maximum 22 characters Volume Sites Up to 13, hence at most 11 RO sites Volume Size Theoretically up to Terabytes (OS-dependent) Volume Types RW, RO, backup, clone 382 A Technical Summary Table A.8. Brief OpenAFS terminology Name Meaning # Normal mount point % Force RW volume .backup Backup volume extension .readonly RO volume extension apropos In most commands available help In most commands available BosConfig Server configuration for bos CellAlias Aliases for cells CellServDB List of DB servers for cells KeyFile Server keytab file NetInfo IP addresses to use NetRestrict IP addresses not to use ThisCell Name of the local cell UserList AFS administrative user (for a server) Table A.9. AFS and Kerberos/OpenAFS AFS OpenAFS bos addkey asetkey add bos listkeys asetkey list bos removekey asetkey delete kas kadmin kaserver fakeka, ka-forwarder klog aklog uss Table A.10. Variable substitution in the Samba configuration file (excerpt) Variable Substitution %D Domain or workgroup name for the current user %h Internet host name of the Samba server %L NetBIOS Samba server name %m NetBIOS client name %M Internet host name of the client %S Current requested service name %U Session username as indicated by the client A Technical Summary 383 Table A.11. Samba account flags Flag Description D Disabled account H Account requires a home directory I Inter-domain account trust L The account has been locked M A Microsoft Network Service (MSN) account N No password is required S Server trust account T A temporarily duplicated account U Normal user account W Workstation trust account X Password does not expire Table A.12. Apache SSL options (excerpt) Option Meaning SSLCACertificateFile The CA public certificate file SSLCARevocationFile The optional revoked certificates list SSLCertificateFile The web server public certificate file SSLCertificateKeyFile The web server private key file SSLCipherSuite Enforces encryption methods for SSL negotiations SSLEngine Enable or disable SSL/TLS SSLProtocol Configures allowed SSL protocols SSLVerifyClient Require the verification of the client’s certificate References [Ait05] Ronald G. F. Aitchison. Pro DNS and BIND. Apress, 2005. [AL06] Paul Albitz and Cricket Liu. DNS and BIND. O’Reilly, 2006. 5th Edition. [Bau05] Michael D. Bauer. Linux Server Security. O’Reilly, 2005. 2nd Edition. [BC02] Daniel P. Bovet and Marco Cesati. Understanding the Linux Kernel. O’Reilly, 2002. 2nd Edition. [BM06] Heiko Bauke and Stephan Mertens. Cluster Computing. Springer, 2006. German. [BSB05] Daniel J. Barret, Richard E. Silverman, and Robert G. Byrnes. SSH, The Secure Shell: The Definitive Guide. O’Reilly, 2005. 2nd Edition. [Buc03] W. J. Buchanan. The Complete Handbook of the Internet. Springer, 2003. [Cam98] Richard Campbell. Managing AFS: The Andrew File System. Prentice Hall, 1998. [Car03] Gerald Carter. LDAP System Administration. O’Reilly, 2003. [Den03] Kyle D. Dent. Postfix: The Definitive Guide. O’Reilly, 2003. [DHS06] Rolf Dietze, Tatjana Heuser, and J¨org Schilling. OpenSolaris f¨ur Anwen- der, Administratoren und Rechenzentren. Springer, 2006. German. [Don06] Taylor Dondich. Network Monitoring with Nagios. O’Reilly, 2006. [Fou95] Open Software Foundation. OSF DCE DFS Administration Guide and Reference. Prentice Hall, 1995. Release 1.1. [GA05] Peter H. Ganten and Wulf Alex. Debian GNU/Linux - PowerPack. Springer, 2005. 2nd Edition, German. [Gar03] Jason Garman. Kerberos: The Definitive Guide. O’Reilly, 2003. [Has02] Jonathan Hassell. RADIUS: Securing Public Access to Private Resources. O’Reilly, 2002. [Jac05] Tom Jackiewicz. Deploying OpenLDAP. Apress, 2005. [KHP05] Yanek Korff, Paco Hope, and Bruce Potter. Mastering FreeBSD and OpenBSD Security. O’Reilly, 2005. [KP05] Michael Kruckenberg and Jay Pipes. Pro MySQL. Apress, 2005. [LL02] Ben Laurie and Peter Laurie. Apache: The Definitive Guide.O’Reilly, 2002. 3rd Edition. [Luc06] Michael W. Lucas. PGP & GPG. No Starch Press, 2006. [McC04] Bill McCarty. SELinux: NSA’s Open Source Security Enhanced Linux. O’Reilly, 2004. [MM00] Dianna Mullet and Kevin Mullet. Managing IMAP. O’Reilly, 2000. 386 References [Mob04] Tony Mobily. Hardening Apache. Apress, 2004. [MS05] Neil Matthews and Rick Stones. Beginning Databases with PostgreSQL: From Novice to Professional. Apress, 2005. 2nd Edition. [PHS03] Josef Pieprzyk, Thomas Hardjono, and Jennifer Seberry. Fundamentals of Computer Security. Springer, 2003. [Pre07] W. Curtis Preston. Backup & Recovery. O’Reilly, 2007. [Ran04] Kyle Rankin. Knoppix Hacks. O’Reilly, 2004. [ROC06] Kyle Rankin, Jonathan Oxer, and Bill Childers. Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux. O’Reilly, 2006. [Roo05] Garrett Rooney. Practical Subversion. Apress, 2005. [Ryb05] Peter Rybaczyk. Expert Network Time Protocol: An Experience in Time with NTP. Apress, 2005. [RYK02] George Reese, Randy J. Yarger, and Tim King. Managing & Using MySQL. O’Reilly, 2002. 2nd Edition with Hugh E. Williams. [SEL01] Hal Stern, Mike Eisler, and Ricardo Labiaga. Managing NFS and NIS. O’Reilly, 2001. 2nd Edition. [Shi05] Chris Shiflett. Essential PHP Security. O’Reilly, 2005. [Slo04] Joseph D. Sloan. High Performance Linux Clusters with OSCAR, Rocks, OpenMosix, and MPI. O’Reilly, 2004. [SMM05] Jared Smith, Jim Van Meggelen, and Leif Madsen. Asterisk: The Future of Telephony. O’Reilly, 2005. [ST05] Michael Stahnke and John Traenkenschuh. Pro OpenSSH. Apress, 2005. [TECB03] Jay Ts, Robert Eckstein, and David Collier-Brown. Using Samba. O’Reilly, 2003. 2nd Edition. [Ves03] Jennifer Vesperman. Essential CVS. O’Reilly, 2003. [VMC02] John Viega, Matt Messier, and Pravir Chandra. Network Security with OpenSSL: Cryptography for Secure Communications. O’Reilly, 2002. [vT05] Henk C. A. van Tilborg, editor. Encyclopedia of Cryptography and Secu- rity. Springer, 2005. [Wai04] Peter Wainwright. Pro Apache. Apress, 2004. 3rd Edition. [WD02] John C. Worsley and Joshua D. Drake. Practical PostgreSQL. O’Reilly, 2002. [WH05] Chris Wolf and Erik M. Halter. Virtualization. Apress, 2005. Web Resources 1. Adaptive Technology Resource Centre. Learning Content Management System. http://www.atutor.ca/. 2. Alexander Enzmann. Persistence of Vision Raytracer. http://www.povray.org/. 3. Amnon Barak. MOSIX Grid and Cluster Management. http://www.mosix.org/. 4. Apache Software Foundation. Apache HTTP Server. http://httpd.apache.org/. 5. Apache Software Foundation. SpamAssassin Spam Filter. http://spamassassin.apache.org/. 6. Apple Computer, Inc. Mac OS X Operating System. http://www.apple.com/macosx/. 7. Argonne National Laboratory. Message Passing Interface. http://www-unix.mcs.anl.gov/mpi/.