On Thu, Mar 18, 2010 at 9:53 AM, Yan Gao <y...@novell.com> wrote: > On 03/18/10 16:33, Andrew Beekhof wrote: >> On Wed, Mar 17, 2010 at 11:12 AM, Yan Gao <y...@novell.com> wrote: >>> Hi Andrew, >>> >>> On 02/23/10 17:23, Yan Gao wrote: >>>> On 02/23/10 04:10, Andrew Beekhof wrote: >>>>> On Mon, Feb 22, 2010 at 8:58 AM, Yan Gao <y...@novell.com> wrote: >>>>>> Hi Andrew, >>>>>> >>>>>> On 02/08/10 17:48, Andrew Beekhof wrote: >>>>>>> On Thu, Feb 4, 2010 at 5:24 PM, Yan Gao <y...@novell.com> wrote: >>>>>>>>> And put exclusions for things like passwords before the read for the >>>>>>>>> whole cib? >>>>>>>> Yes. We should specify any "deny" and "write" objects before it. >>>>>>> >>>>>>> I like the syntax now, but my original concern (that all the >>>>>>> validation occurs in the client library) remains... so this still >>>>>>> isn't providing any real security. >>>>>> Right. If it's impossible for cib to run as root, >>>>> >>>>> If you need root for this, I think we can allow that change for 1.1. >>>>> >>>> Great! So PAM is still preferred. Anyway, I'll have a dig at different >>>> ways. I think we can make that change when the authentication is ready, >>>> and if it's necessary. >>> After investigating, I found that Unix domain sockets provide methods to >>> identify the user on the other side of a socket. That means we don't need >>> PAM to do authentication for local access, and the clients doesn't need >>> to prompt user to input and transfer username/password to the server. >>> And cib daemon still can run as "hacluster". >>> >>> I've improved the ipcsocket library of cluster-glue to record user's >>> identity >>> info for cib to use. >> >> Looks good, but what about remote connections? >> > A remote access still needs to prompt user to input the password and go > through > the PAM authentication completely as before. Once passed, the username will > be added > into the op_request XML for cib_common_callback_worker() to process, which is > the same > behavior as a local access.
I'm not hugely enthusiastic about having two different authentication mechanisms. All things considered, allowing the cib to run as root and continuing to use PAM seems preferable. _______________________________________________ Pacemaker mailing list Pacemaker@oss.clusterlabs.org http://oss.clusterlabs.org/mailman/listinfo/pacemaker