Man Linux: Main Page and Category List

NAME

       system.rootdaemonrc, .rootdaemonrc - access control directives for ROOT
       daemons

LOCATIONS

       ROOTDAEMORC, $HOME/.rootdaemonrc
       /etc/root/system.rootdaemonrc, $ROOTSYS/etc/system.rootdaemonrc

DESCRIPTION

       This manual page documents the format of directives  specifying  access
       control  directives  for ROOT daemons. These directives are read from a
       text file whose full  path  is  taken  from  the  environment  variable
       ROOTDAEMONRC.   If such a variable in undefined, the daemon looks for a
       file named .rootdaemonrc in the $HOME directory of  the  user  starting
       the   daemon;   if   this   file  does  not  exists  either,  the  file
       system.rootdaemonrc, located under /etc/root or $ROOTSYS/etc, is  used.
       If  none of these file exists (or is readable), the daemon makes use of
       a default built-in directive derived from the configuration options  of
       the installation.

FORMAT

       *      lines starting with ’#’ are comment lines.

       *      hosts  can  specified  either  with their name (e.g. pcepsft43),
              their FQDN (e.g. pcepsft43.cern.ch) or their  IP  address  (e.g.
              137.138.99.73).

       *      host  names  can  be  followed  by  :rootd, :proofd or :sockd to
              define directives applying only to the  given  service;  ’sockd’
              applies  to servers run from interactive sessions (TServerSocket
              class)

       *      directives applying to all  host  can  be  specified  either  by
              ’default’ or ’*’

       *      the  ’*’  character  can  be  used  in  any field of the name to
              indicate a set of machines  or  domains,  e.g.  pcepsft*.cern.ch
              applies  to  all ’pcepsft’ machines in the domain ’cern.ch’. (to
              indicate all ’lxplus’ machines you should use  ’lxplus*.cern.ch’
              because internally the generic lxplus machine has a real name of
              the form lxplusnnn.cern.ch; you can also  use  ’lxplus’  if  you
              don’t care about domain name checking).

       *      a  whole  domain  can  be indicated by its name, e.g. ’cern.ch’,
              ’cnaf.infn.it’ or ’.ch’

       *      truncated IP address can also be  used  to  indicate  a  set  of
              machines;  they  are  interpreted as the very first or very last
              part of the address; for example, to select  137.138.99.73,  any
              of  these  is valid: ’137.138.99’, ’137.138’, ’137‘, ’99.73’; or
              with wild cards: ’137.13*’ or ’*.99.73‘;  however,  ’138.99’  is
              invalid because ambiguous.

       *      the  information  following the name or IP address indicates, in
              order of preference, the short names or the  internal  codes  of
              authentication  methods  accepted  for  requests coming from the
              specified host(s); the ones implemented so far are:

                 Method                           nickname    code

                 UsrPwd                            usrpwd       0
                 SRP                               srp          1
                 Kerberos                          krb5         2
                 Globus                            globus       3
                 SSH                               ssh          4
                 UidGid                            uidgid       5   (insecure)

              (The  insecure  method  is  intended to speed up access within a
              cluster protected by other means from  outside  attacks;  should
              not  be  used for inter-cluster or inter-domain authentication).
              Methods non specified  explicitly  are  not  accepted.  For  the
              insecure method it is possible to give access only to a specific
              list of users by  specifying  the  usernames  after  the  method
              separated by colons (:) example:

                 uidgid:user1:user2:user3

              will  allow  uidgid access only to users user1, user2 and user3.
              This is useful to give easy access to data servers. It  is  also
              possible to deny access to a user by using a ’-’ in front of the
              name:

                 uidgid:-user4

       *      Lines ending with ’´ are followed by additional information  for
              the  host  on  the next line; the name of the host should not be
              repeated.

EXAMPLES

       Valid examples:

       default none
              All  requests  are  denied   unless   specified   by   dedicated
              directives.

       default 0 ssh
              Authentication  mechanisms allowed by default are ’usrpwd’ (code
              0) and ’ssh’

       137.138. 0 4
              Authentication  mechanisms  allowed  from  host  in  the  domain
              137.138. (cern.ch) are ’usrpwd’ (code 0) and ’ssh’

       pceple19.cern.ch 4 1 3 2 5 0
              All  mechanisms  are  accepted  for  requests  coming  from host
              pceple19.cern.ch .

       lxplus*.cern.ch 4 1 globus 0:qwerty:uytre
              Requests from the lxplus cluster can authenticate  using  ’ssh’,
              ’srp’  and  ’globus’;  users  ’qwerty’  and ’uytre’ can also use
              ’usrpwd’ .

       pcep*.cern.ch:rootd 0:-qwerty 4
              Requests from the pcep*.cern.ch  nodes  can  authenticate  using
              ’usrpwd’  and  ’ssh’  when  accessing  the ’rootd’ daemon ; user
              ’qwerty’ can only use ’ssh’.

SEE ALSO

       rootd(1), proofd(1)

       For  more  information  on   the   ROOT   system,   please   refer   to
       http://root.cern.ch/ .

ORIGINAL AUTHORS

       The ROOT team (see web page above):
              Rene Brun and Fons Rademakers

COPYRIGHT

       This library is free software; you can redistribute it and/or modify it
       under the terms of the GNU Lesser General Public License  as  published
       by  the Free Software Foundation; either version 2.1 of the License, or
       (at your option) any later version.

       This library is distributed in the hope that it  will  be  useful,  but
       WITHOUT   ANY   WARRANTY;   without   even   the  implied  warranty  of
       MERCHANTABILITY or FITNESS FOR  A  PARTICULAR  PURPOSE.   See  the  GNU
       Lesser General Public License for more details.

       You  should  have  received  a  copy  of  the GNU Lesser General Public
       License along with this library; if not, write  to  the  Free  Software
       Foundation,  Inc.,  51 Franklin St, Fifth Floor, Boston, MA  02110-1301
       USA

AUTHOR

       This manual page was written by G. Ganis <g.ganis@cern.ch> .