From: jparsons@sourceware.org <jparsons@sourceware.org>
To: cluster-devel.redhat.com
Subject: [Cluster-devel] conga/luci/docs user_manual.html
Date: 15 Jan 2007 21:43:16 -0000 [thread overview]
Message-ID: <20070115214316.12423.qmail@sourceware.org> (raw)
CVSROOT: /cvs/cluster
Module name: conga
Branch: RHEL5
Changes by: jparsons at sourceware.org 2007-01-15 21:43:16
Modified files:
luci/docs : user_manual.html
Log message:
clarification about adding a cluster
Patches:
http://sourceware.org/cgi-bin/cvsweb.cgi/conga/luci/docs/user_manual.html.diff?cvsroot=cluster&only_with_tag=RHEL5&r1=1.7.2.2&r2=1.7.2.3
--- conga/luci/docs/user_manual.html 2007/01/15 21:23:53 1.7.2.2
+++ conga/luci/docs/user_manual.html 2007/01/15 21:43:15 1.7.2.3
@@ -48,7 +48,7 @@
<ul><li>backup: This option backs the luci server up to a file.</li>
<li>restore: This restores a luci site from a backup file.</li>
- <li>init: This option regenerates ssl certs.</li>
+ <li>init: This option regenerates SSL certs.</li>
<li>help: Shows usage</li>
</ul>
<h4>Logging In</h4>
@@ -113,7 +113,7 @@
<b>Figure #3: Add a System</b>
<p/>
<p/>
- The fully qualified domain name OR IP Address of the system is entered in the
+ The fully qualified domain name OR IP address of the system is entered in the
System Hostname field. The root password for the system is entered in the
adjacent field. As a convenience for adding multiple systems at once, and Add
Another Entry button is provided. When this button is clicked and at least
@@ -138,13 +138,14 @@
For most typical datacenter deployments of conga, the luci server will
reside on a system within the confines of the datacenter network, and
the datacenter systems can pretty safely be assumed to be trustworthy.
- If a luci server is used to connect to systems across the open internet,
- the user <i>could</i> be vulnerable to a form of security assault known
- as the 'Man in the Middle' attack; wherein a hostile party spoofs the
- hostname or IP address of a system to be added to a luci server.
+ If a luci server is used to connect to systems across the open Internet,
+ the user <i>could</i> be vulnerable to a form of security attack known
+ as a 'Man in the Middle' attack; wherein a hostile party that sits between
+ the client and server intercepts data exchanged, while masquerading
+ to its peers as a legitimate party, and issues potentially malicious commands.
<p/>
If the user would like to verify the certificate of a ricci agent before
- authenticating to it (avoiding a 'Man in the Middle' form of attack), the
+ authenticating to it (avoiding a 'Man in the Middle' attack), the
checkbox marked <b>Verify system certificates before sending any
passwords</b> should be checked. With this box checked, clicking submit
retrieves the certificate information for all systems listed, and provides
@@ -152,7 +153,7 @@
be sent without the trust box checked. To add the system or systems,
click the 'Trust' checkboxes for each row desired and click submit again.
Mousing over the lock icon for
- a row entry will display the certificate information for just that system.
+ a row entry will display the certificate information for just that system. It is important to note that in order to defend against this type of attack, the user must know the certificate fingerprints of client systems prior to the initial key exchange. When the client systems are added, the user can then compare the known certificate fingerprints with the fingerprints displayed by the luci server to verify they match. A mismatch indicates the possibility of an attack.
<p/>
<img src="./addsys_33.png"/><br/>
<b>Figure #5: Certificate Verification Page</b>
@@ -174,11 +175,9 @@
authenticated. The cluster and subsequent nodes are only added after the
entire list has been submitted with the Submit button, and all nodes
authenticate. <p/>
-
+<p>
If any nodes fail to authenticate, they appear in the list in red font, so that
- the password can be corrected and the node list submitted again. Luci has a
- strict policy about adding a cluster to be managed: A cluster cannot be added
- unless ALL nodes can be reached and authenticated.
+ the password can be corrected and the node list submitted again. Luci allows an existing cluster to be added even if one or more nodes is down, unreachable or otherwise non-operational. If any nodes are not authenticated at the time their cluster is added, they must be authenticated when possible, via the "Reauthenticate to Storage or Cluster Systems" form in the "Manage Systems" section located in the "Homebase" tab.</p>
<p/>When a cluster is added to a luci server, all nodes are also added as general systems so that storage may be managed on them. If this is not desired, the individual systems may be removed from luci, while remote cluster management capability is maintained.<p/>
NOTE: If an administrator desires to create a new cluster, this capability is
available on the Cluster tab. This task link is only for adding and managing
@@ -329,7 +328,7 @@
<p/>
<p/>
The Add a Node page is similar in look and function to the Add a System
- page available in the Homebase tab. The system hostname of IP Address is
+ page available in the Homebase tab. The system hostname of IP address is
entered in the appropriate field along with the password for the
system. Multiple nodes may be added at once. The user is offered the
chance to verify the certificate for the new node to be added, just as
next reply other threads:[~2007-01-15 21:43 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-01-15 21:43 jparsons [this message]
-- strict thread matches above, loose matches on Subject: below --
2007-06-25 19:27 [Cluster-devel] conga/luci/docs user_manual.html jparsons
2007-01-15 21:41 jparsons
2007-01-15 21:23 jparsons
2007-01-15 20:33 rmccabe
2007-01-15 20:26 rmccabe
2007-01-15 20:03 jparsons
2007-01-15 19:57 rmccabe
2007-01-15 19:46 jparsons
2007-01-15 16:00 jparsons
2006-10-10 18:31 rmccabe
2006-10-09 5:47 jparsons
2006-09-26 13:35 jparsons
2006-09-26 12:36 jparsons
2006-09-26 12:12 jparsons
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20070115214316.12423.qmail@sourceware.org \
--to=jparsons@sourceware.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).