<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to XCAT_2_Security</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>Recent changes to XCAT_2_Security</description><atom:link href="https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/feed" rel="self"/><language>en</language><lastBuildDate>Tue, 12 Aug 2014 21:46:22 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/feed" rel="self" type="application/rss+xml"/><item><title>XCAT_2_Security modified by &lt;REDACTED&gt;</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v49
+++ v50
@@ -1,4 +1,4 @@
-[[img src=Official-xcat-doc.png]] 
+![](http://sourceforge.net/p/xcat/wiki/XCAT_Documentation/attachment/Official-xcat-doc.png)

 [TOC]

&lt;/pre&gt;
&lt;/div&gt;</description><pubDate>Tue, 12 Aug 2014 21:46:22 -0000</pubDate><guid>https://sourceforge.net1ef33a08724502c7b55b05622696c8c18217e17c</guid></item><item><title>XCAT_2_Security modified by Lissa Valletta</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v48
+++ v49
@@ -148,7 +148,7 @@

 ### Secure Zones
 As of xCAT 2.8.4, you can setup secure zones in xCAT in the cluster.  A node in the zone can ssh without password to any other node in the zone,  but not to nodes in other zones.  See the following documentation:
-[Setting_Up_Zone]
+[Setting_Up_Zones]

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lissa Valletta</dc:creator><pubDate>Thu, 24 Jul 2014 17:24:35 -0000</pubDate><guid>https://sourceforge.netd6ad21ced848ece881d91dc8dc6204aea2024fea</guid></item><item><title>XCAT_2_Security modified by Lissa Valletta</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v47
+++ v48
@@ -146,6 +146,9 @@
 See [Disable_node_to_node_root_passwordless_access]

+### Secure Zones
+As of xCAT 2.8.4, you can setup secure zones in xCAT in the cluster.  A node in the zone can ssh without password to any other node in the zone,  but not to nodes in other zones.  See the following documentation:
+[Setting_Up_Zone]

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lissa Valletta</dc:creator><pubDate>Thu, 24 Jul 2014 17:23:40 -0000</pubDate><guid>https://sourceforge.net48b32f6c30905d43533d30160d6606418d9f01e1</guid></item><item><title>XCAT_2_Security modified by Lissa Valletta</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v46
+++ v47
@@ -127,7 +127,9 @@

 ## OpenSSH

-xCAT performs the setup for root to be able to ssh without password from the Management Node(MN) to all the nodes in the cluster. All nodes are able to ssh to each other without password or being prompted for a known_host entry, unless restricted (see [XCAT_2_Security#Restricting_node_to_node_ssh]). Nodes cannot ssh back to the Management Node or Service Nodes without a password by default. 
+xCAT performs the setup for root to be able to ssh without password from the Management Node(MN) to all the nodes in the cluster. All nodes are able to ssh to each other without password or being prompted for a known_host entry, unless restricted.
+See [XCAT_2_Security/#restricting-node-to-node-ssh](XCAT_2_Security/#restricting-node-to-node-ssh). 
+Nodes cannot ssh back to the Management Node or Service Nodes without a password by default. 

 xCAT generates, on the MN, a new set of ssh hostkeys for the nodes to share, which are distributed to all the nodes during install. If ssh keys do not already exist for root on the MN, it will generate an id_rsa public and private key pair. 
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lissa Valletta</dc:creator><pubDate>Thu, 24 Jul 2014 17:20:56 -0000</pubDate><guid>https://sourceforge.net5cab3517c1647cf598ad39a5662a28206ec11fae</guid></item><item><title>XCAT_2_Security modified by Lissa Valletta</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v45
+++ v46
@@ -12,7 +12,7 @@

 The xCAT Home Page: http://xcat.sourceforge.net/ 

-xCAT Architecture: https://sourceforge.net/apps/mediawiki/xcat/index.php?title=XCAT_2_Architecture 
+xCAT Architecture: [XCAT_2_Architecture] 

 ### Some Requirements (need more)

@@ -27,7 +27,8 @@
 xCAT logs xCAT commands run by the xcatd daemon to both the syslog and the auditlog table in the xCAT database. The commands that are audited can be “ALL” xCAT commands or a list provided by the admin. The auditlog table allows the admin to monitor any attacks against the system or simply over use of resources. The auditlog table is store in the xCAT database ( sqlite,MySQL, Postgresql, DB2) and contains the following record. 

 recid: The record id. 
-    
+ 
+~~~~   
       audittime:     The timestamp for the audit entry.
       userid:        The user running the command.
       clientname:    The client machine, where the command originated.
@@ -36,7 +37,7 @@
       noderange:     The noderange on which the command was run.
       args:          The command argument list.
       status:        Allowed or Denied.
-    
+~~~~    

 For more information about auditing, refer to the following documentation: 

@@ -91,26 +92,30 @@
 The password for root could be stored MD5 encrypted in the passwd table, here is an example on how to use this in Linux cluster. 

 1\. Change the password in passwd table as MD5 encrypted 
-    
+  
+~~~~  
     tabch key=system passwd.username=root passwd.password=`openssl passwd -1 passw0rd`
-    
+~~~~    

 2\. Use the encrypted password for node provisioning: 

 For diskful: 
-    
-     nodeset &amp;lt;noderange&amp;gt; osimage=&amp;lt;osimage_name&amp;gt;
-    
+ 
+~~~~   
+     nodeset &amp;lt;noderange&amp;gt; osimage=&amp;lt;osimage_name&amp;gt;
+~~~~    

 For stateless: 
-    
-     packimg &amp;lt;osimage_name&amp;gt;
-    
+
+~~~~    
+     packimg &amp;lt;osimage_name&amp;gt;
+~~~~    

 For statelite: 
-    
-     liteimg &amp;lt;osimage_name&amp;gt;
-    
+  
+~~~~  
+     liteimg &amp;lt;osimage_name&amp;gt;
+~~~~    

 ## Certificates

@@ -135,7 +140,8 @@

 ### Restricting node to node ssh

-As of xCAT 2.6, xcat provides a way to limit which nodes are setup to ssh without password to other nodes. See [Disable_node_to_node_root_passwordless_access] 
+As of xCAT 2.6, xcat provides a way to limit which nodes are setup to ssh without password to other nodes. 
+See [Disable_node_to_node_root_passwordless_access] 

@@ -187,9 +193,7 @@

 xCAT needs to integrate with or support a secure Identity Management protocol. This include User id management and machine management. 

-Some of the options being considered are: 
-
-  
+Some of the options being considered are:   

 #### Active Directory
@@ -206,7 +210,7 @@

 #### LDAP

-Better integration with LDAP. Right now xCAT only has a documented procedure to follow: [Setting_up_LDAP_in_xCAT]. 
+Better integration with LDAP. Right now xCAT only has a documented procedure to follow:[Setting_up_LDAP_in_xCAT]. 

 ### Safe-Guarding Passwords in xCAT

@@ -223,5 +227,4 @@
 [XCAT_Port_Usage] 

 ## Notes
-
-  * Latest release of GPFS only requires root ssh on nodes that will be used to manage GPFS 
+Latest release of GPFS only requires root ssh on nodes that will be used to manage GPFS 
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lissa Valletta</dc:creator><pubDate>Thu, 24 Jul 2014 17:18:03 -0000</pubDate><guid>https://sourceforge.netef7b76fdaeecdc10ab424678615411f841d1f14a</guid></item><item><title>XCAT_2_Security modified by Lissa Valletta</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v44
+++ v45
@@ -74,7 +74,7 @@

 During installation, xCAT gives only root userid the authority to run xCAT commands including accessing the database. 

-The policy table in the xCAT database controls who has authority to run specific xCAT operations. It is basically the Access Control List (ACL) for xCAT. The admin ( running as root) may change the policy table to allow other userids to run some or all commands based on configurable restrictions. 
+The policy table in the xCAT database controls who has authority to run specific xCAT operations. It is basically the Access Control List (ACL) for xCAT. The admin ( running as root) may change the policy table to allow other userids to run some or all commands based on configurable restrictions. As of xCAT release 2.8.3 or later, the policy table is first sorted by the priority field, before it is checked. 

 For more information about the policy Table, refer to the following documentation: 

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Lissa Valletta</dc:creator><pubDate>Mon, 23 Jun 2014 17:58:30 -0000</pubDate><guid>https://sourceforge.neta9c2342ea7b8dd0e643a55e2334ed112e1a4e5a8</guid></item><item><title>XCAT_2_Security modified by Bruce</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v43
+++ v44
@@ -1,3 +1,5 @@
+[[img src=Official-xcat-doc.png]] 
+
 [TOC]

 ## Overview
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bruce</dc:creator><pubDate>Mon, 23 Jun 2014 17:58:29 -0000</pubDate><guid>https://sourceforge.net9dfd9c20f96e44af583be55634a650b57d871fb7</guid></item><item><title>XCAT_2_Security modified by Guang Cheng Li</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v42
+++ v43
@@ -86,28 +86,14 @@

 In the table you can set the password for root, to be set during the install of the node. This protects the node from any window of time where root is not assigned a password. 

-The password for root could be stored MD5, SHA256 or SHA512 encrypted in the passwd table, here is an example on how to use this in Linux cluster. 
-
-If MD5 is used as the encrypt method, the steps 1,2,3 below could be replaced with one command. 
-    
-     tabch key=system passwd.username=root passwd.password=`openssl passwd -1 passw0rd`
-    
-
-1\. Create a new user on the management node 
-
-2\. Change the password of this new user as MD5, SHA256 or SHA512 encrypted 
-    
-     echo passw0rd | chpasswd -c &amp;lt;encrypt_method&amp;gt;
-    
-
-where the &amp;lt;encrypt_method&amp;gt; could be MD5, SHA256 or SHA512 
-
-3\. Copy the encrypted user password to passwd table 
-    
-    tabch key=system passwd.username=root passwd.password=`cat /etc/shadow | grep &amp;lt;new_user&amp;gt; | awk -F ':' '{print $2}'`
-    
-
-4\. Use the encrypted password for node provisioning: 
+The password for root could be stored MD5 encrypted in the passwd table, here is an example on how to use this in Linux cluster. 
+
+1\. Change the password in passwd table as MD5 encrypted 
+    
+    tabch key=system passwd.username=root passwd.password=`openssl passwd -1 passw0rd`
+    
+
+2\. Use the encrypted password for node provisioning: 

 For diskful: 

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Guang Cheng Li</dc:creator><pubDate>Mon, 23 Jun 2014 17:58:26 -0000</pubDate><guid>https://sourceforge.net986a8ef91a46d837e22de8a99b9a7d3e27dc3ba5</guid></item><item><title>XCAT_2_Security modified by Guang Cheng Li</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v41
+++ v42
@@ -86,14 +86,28 @@

 In the table you can set the password for root, to be set during the install of the node. This protects the node from any window of time where root is not assigned a password. 

-The password for root could be stored MD5 encrypted in the passwd table, here is an example on how to use this in Linux cluster. 
-
-1\. Change the password in passwd table as MD5 encrypted 
-    
-    tabch key=system passwd.username=root passwd.password=`openssl passwd -1 passw0rd`
-    
-
-2\. Use the encrypted password for node provisioning: 
+The password for root could be stored MD5, SHA256 or SHA512 encrypted in the passwd table, here is an example on how to use this in Linux cluster. 
+
+If MD5 is used as the encrypt method, the steps 1,2,3 below could be replaced with one command. 
+    
+     tabch key=system passwd.username=root passwd.password=`openssl passwd -1 passw0rd`
+    
+
+1\. Create a new user on the management node 
+
+2\. Change the password of this new user as MD5, SHA256 or SHA512 encrypted 
+    
+     echo passw0rd | chpasswd -c &amp;lt;encrypt_method&amp;gt;
+    
+
+where the &amp;lt;encrypt_method&amp;gt; could be MD5, SHA256 or SHA512 
+
+3\. Copy the encrypted user password to passwd table 
+    
+    tabch key=system passwd.username=root passwd.password=`cat /etc/shadow | grep &amp;lt;new_user&amp;gt; | awk -F ':' '{print $2}'`
+    
+
+4\. Use the encrypted password for node provisioning: 

 For diskful: 

&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Guang Cheng Li</dc:creator><pubDate>Mon, 23 Jun 2014 17:58:25 -0000</pubDate><guid>https://sourceforge.netccd91d21bfb6db46427d1e45a6e35398ae756ffd</guid></item><item><title>XCAT_2_Security modified by Guang Cheng Li</title><link>https://sourceforge.net/p/xcat/wiki/XCAT_2_Security/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v40
+++ v41
@@ -86,6 +86,30 @@

 In the table you can set the password for root, to be set during the install of the node. This protects the node from any window of time where root is not assigned a password. 

+The password for root could be stored MD5 encrypted in the passwd table, here is an example on how to use this in Linux cluster. 
+
+1\. Change the password in passwd table as MD5 encrypted 
+    
+    tabch key=system passwd.username=root passwd.password=`openssl passwd -1 passw0rd`
+    
+
+2\. Use the encrypted password for node provisioning: 
+
+For diskful: 
+    
+     nodeset &amp;lt;noderange&amp;gt; osimage=&amp;lt;osimage_name&amp;gt;
+    
+
+For stateless: 
+    
+     packimg &amp;lt;osimage_name&amp;gt;
+    
+
+For statelite: 
+    
+     liteimg &amp;lt;osimage_name&amp;gt;
+    
+
 ## Certificates

 xCAT generates X.509 (SSL) certificates which it installs on nodes, such as the Service Nodes, where it needs to ensure a secure connection using the SSL/TLS protocol. 
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Guang Cheng Li</dc:creator><pubDate>Mon, 23 Jun 2014 17:58:24 -0000</pubDate><guid>https://sourceforge.net5739dbd19d247d0454fc50eb8601c2e9f338a5b6</guid></item></channel></rss>