1SYSTEM.ROOTDAEMONRC(1)      General Commands Manual     SYSTEM.ROOTDAEMONRC(1)
2
3
4

NOTA BENE

6       Usage of this file is deprecated and will be removed in future versions
7       of ROOT.
8
9       Please contact the ROOT team at  http://root.cern.ch  in  the  unlikely
10       event this change is disruptive for your workflow.
11

NAME

13       system.rootdaemonrc, .rootdaemonrc - access control directives for ROOT
14       daemons
15

LOCATIONS

17       ROOTDAEMORC, $HOME/.rootdaemonrc
18       /etc/root/system.rootdaemonrc, $ROOTSYS/etc/system.rootdaemonrc
19

DESCRIPTION

21       This manual page documents the format of directives  specifying  access
22       control  directives  for ROOT daemons. These directives are read from a
23       text file whose full path is taken from the environment variable  ROOT‐
24       DAEMONRC.  If such a variable in undefined, the daemon looks for a file
25       named .rootdaemonrc in the $HOME directory of  the  user  starting  the
26       daemon;  if  this file does not exists either, the file system.rootdae‐
27       monrc, located under /etc/root or $ROOTSYS/etc, is used.   If  none  of
28       these  file  exists (or is readable), the daemon makes use of a default
29       built-in directive  derived  from  the  configuration  options  of  the
30       installation.
31
32

FORMAT

34       *      lines starting with '#' are comment lines.
35
36       *      hosts  can  specified  either  with their name (e.g. pcepsft43),
37              their FQDN (e.g. pcepsft43.cern.ch) or their  IP  address  (e.g.
38              137.138.99.73).
39
40       *      directives  applying  to  all  host  can  be specified either by
41              'default' or '*'
42
43       *      the '*' character can be used in any field of the name to  indi‐
44              cate a set of machines or domains, e.g. pcepsft*.cern.ch applies
45              to all 'pcepsft' machines in the domain 'cern.ch'. (to  indicate
46              all  'lxplus'  machines you should use 'lxplus*.cern.ch' because
47              internally the generic lxplus machine has a  real  name  of  the
48              form  lxplusnnn.cern.ch;  you can also use 'lxplus' if you don't
49              care about domain name checking).
50
51       *      a whole domain can be indicated by  its  name,  e.g.  'cern.ch',
52              'cnaf.infn.it' or '.ch'
53
54       *      truncated  IP  address  can  also  be  used to indicate a set of
55              machines; they are interpreted as the very first  or  very  last
56              part  of  the address; for example, to select 137.138.99.73, any
57              of these is valid: '137.138.99', '137.138', '137`,  '99.73';  or
58              with  wild  cards:  '137.13*' or '*.99.73`; however, '138.99' is
59              invalid because ambiguous.
60
61       *      the information following the name or IP address  indicates,  in
62              order  of  preference,  the short names or the internal codes of
63              authentication methods accepted for  requests  coming  from  the
64              specified host(s); the ones implemented so far are:
65
66                 Method                           nickname    code
67
68                 UsrPwd                            usrpwd       0
69                 SRP                               srp          1
70                 Kerberos                          krb5         2
71                 Globus                            globus       3
72                 UidGid                            uidgid       5   (insecure)
73
74              (The  insecure  method  is  intended to speed up access within a
75              cluster protected by other means from  outside  attacks;  should
76              not  be  used for inter-cluster or inter-domain authentication).
77              Methods non specified explicitly are not accepted. For the inse‐
78              cure  method  it  is  possible to give access only to a specific
79              list of users by specifying the usernames after the method sepa‐
80              rated by colons (:) example:
81
82                 uidgid:user1:user2:user3
83
84              will  allow  uidgid access only to users user1, user2 and user3.
85              This is useful to give easy access to data servers. It  is  also
86              possible to deny access to a user by using a '-' in front of the
87              name:
88
89                 uidgid:-user4
90
91       *      Lines ending with '´ are followed by additional information  for
92              the  host  on  the next line; the name of the host should not be
93              repeated.
94
95

EXAMPLES

97       Valid examples:
98
99
100       default none
101              All requests are denied unless  specified  by  dedicated  direc‐
102              tives.
103
104
105       default 0
106              Authentication  mechanisms allowed by default are 'usrpwd' (code
107              0) and 'ssh'
108
109
110       137.138. 0
111              Authentication  mechanisms  allowed  from  host  in  the  domain
112              137.138. (cern.ch) are 'usrpwd' (code 0) and 'ssh'
113
114
115       pceple19.cern.ch 1 3 2 5 0
116              All  mechanisms  are accepted for requests coming from host pce‐
117              ple19.cern.ch .
118
119
120       lxplus*.cern.ch 1 globus 0:qwerty:uytre
121              Requests from the lxplus cluster can authenticate  using  'ssh',
122              'srp'  and  'globus';  users  'qwerty'  and 'uytre' can also use
123              'usrpwd' .
124
125
126       pcep*.cern.ch 0:-qwerty
127              Requests from the pcep*.cern.ch  nodes  can  authenticate  using
128              'usrpwd'  and  'ssh'  when  accessing  the 'rootd' daemon ; user
129              'qwerty' can only use 'ssh'.
130
131
132       For  more  information  on   the   ROOT   system,   please   refer   to
133       http://root.cern.ch/ .
134
135

ORIGINAL AUTHORS

137       The ROOT team (see web page above):
138              Rene Brun and Fons Rademakers
139
141       This library is free software; you can redistribute it and/or modify it
142       under the terms of the GNU Lesser General Public License  as  published
143       by  the Free Software Foundation; either version 2.1 of the License, or
144       (at your option) any later version.
145
146       This library is distributed in the hope that it  will  be  useful,  but
147       WITHOUT  ANY  WARRANTY;  without  even  the  implied  warranty  of MER‐
148       CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the  GNU  Lesser
149       General Public License for more details.
150
151       You  should  have  received  a  copy  of  the GNU Lesser General Public
152       License along with this library; if not, write  to  the  Free  Software
153       Foundation,  Inc.,  51 Franklin St, Fifth Floor, Boston, MA  02110-1301
154       USA
155

AUTHOR

157       This manual page was written by G. Ganis <g.ganis@cern.ch> .
158
159
160
161ROOT                               Version 4            SYSTEM.ROOTDAEMONRC(1)
Impressum