Man Linux: Main Page and Category List


       stap-authorize-server-cert - systemtap server authorization utility


       stap-authorize-server-cert CERTFILE [ DIRNAME ]


       A  systemtap  compile  server  listens  for  connections  from  clients
       (stap-client) on a secure SSL network port and accepts requests to  run
       the   stap   front   end.  Each  server  advertises  its  presence  and
       configuration on the local network  using  mDNS  (avahi)  allowing  for
       automatic detection by clients.

       The  security  of  the  SSL  network  connection between the client and
       server depends on the proper management of server certificates.

       The trustworthiness of a given systemtap server can not  be  determined
       automatically without a trusted certificate authority issuing systemtap
       server certificates. This is not practical  in  everyday  use  and  so,
       clients must authenticate servers against their own database of trusted
       server certificates. In this context, establishing a  given  server  as
       trusted by a given client means adding that server's certificate to the
       client's database of trusted servers.

       The  stap-authorize-server-cert   program   adds   the   given   server
       certificate  to the given client-side certificate database, making that
       server a trusted server for clients using that database.


       The stap-authorize-server-cert program accepts two arguments:

              This is the name of the file containing the certificate  of  the
              new  trusted  server. This is the file named stap.cert which can
              be found in the server's certificate database.   On  the  server
              host,  for  servers  started  by  the  stap-server service, this
              database           can           be           found           in
              /var/lib/stap-server/.systemtap/ssl/server/.  For servers run by
              other  non-root  users,  this   database   can   be   found   in
              $HOME/.systemtap/ssl/server/.   For  root users (EUID=0), it can
              be found in /etc/systemtap/ssl/server.

              This optional argument is the name of the  directory  containing
              the client-side certificate database to which the certificate is
              to be added. If not specified, the default, for non-root  users,
              is  $HOME/.systemtap/ssl/client.   For  root users (EUID=0), the
              default  is  /etc/systemtap/ssl/client,  which  is  the   global
              client-side  certificate  database.  That is, the default result
              is that all users on the client host will trust this server when
              stap-authorize-server-cert is run by root and that only the user
              running  stap-authorize-server-cert  will   trust   the   server


       Systemtap  is  an administrative tool.  It exposes kernel internal data
       structures and potentially private user information.  See  the  stap(1)
       manual page for additional information on safety and security.

       The  systemtap  server  and its related utilities use the Secure Socket
       Layer (SSL) as implemented  by  Network  Security  Services  (NSS)  for
       network  security.  The NSS tool certutil is used for the generation of
       certificates. The related certificate databases must  be  protected  in
       order  to  maintain  the  security of the system.  Use of the utilities
       provided will help to ensure that the proper protection is  maintained.
       The  systemtap  client  will check for proper access permissions before
       making use of any certificate database.


              Public (root's) client side certificate database.

              User's private client side certificate database.

              Server  certificate  for  servers  started  by  the  stap-server


       stap(1), stap-server(8), stap-client(8), NSS, certutil


       Use  the  Bugzilla  link  of  the project web page or our mailing list., <>.