[Cluster-devel] conga/luci/docs user_manual.html

jparsons at sourceware.org jparsons at sourceware.org
Mon Jan 15 21:43:16 UTC 2007


CVSROOT:	/cvs/cluster
Module name:	conga
Branch: 	RHEL5
Changes by:	jparsons at sourceware.org	2007-01-15 21:43:16

Modified files:
	luci/docs      : user_manual.html 

Log message:
	clarification about adding a cluster

Patches:
http://sourceware.org/cgi-bin/cvsweb.cgi/conga/luci/docs/user_manual.html.diff?cvsroot=cluster&only_with_tag=RHEL5&r1=1.7.2.2&r2=1.7.2.3

--- conga/luci/docs/user_manual.html	2007/01/15 21:23:53	1.7.2.2
+++ conga/luci/docs/user_manual.html	2007/01/15 21:43:15	1.7.2.3
@@ -48,7 +48,7 @@
 
   <ul><li>backup:  This option backs the luci server up to a file.</li>
       <li>restore: This restores a luci site from a backup file.</li>
-      <li>init: This option regenerates ssl certs.</li>
+      <li>init: This option regenerates SSL certs.</li>
       <li>help: Shows usage</li>
   </ul>
     <h4>Logging In</h4>
@@ -113,7 +113,7 @@
   <b>Figure #3: Add a System</b>
   <p/>
   <p/>
-  The fully qualified domain name OR IP Address of the system is entered in the
+  The fully qualified domain name OR IP address of the system is entered in the
   System Hostname field. The root password for the system is entered in the
   adjacent field. As a convenience for adding multiple systems at once, and Add
   Another Entry button is provided. When this button is clicked and at least
@@ -138,13 +138,14 @@
   For most typical datacenter deployments of conga, the luci server will
   reside on a system within the confines of the datacenter network, and 
   the datacenter systems can pretty safely be assumed to be trustworthy.
-  If a luci server is used to connect to systems across the open internet,
-  the user <i>could</i> be vulnerable to a form of security assault known
-  as the 'Man in the Middle' attack; wherein a hostile party spoofs the 
-  hostname or IP address of a system to be added to a luci server.
+  If a luci server is used to connect to systems across the open Internet,
+  the user <i>could</i> be vulnerable to a form of security attack known
+  as a 'Man in the Middle' attack; wherein a hostile party that sits between
+  the client and server intercepts data exchanged, while masquerading
+  to its peers as a legitimate party, and issues potentially malicious commands.
   <p/>
   If the user would like to verify the certificate of a ricci agent before 
-  authenticating to it (avoiding a 'Man in the Middle' form of attack), the 
+  authenticating to it (avoiding a 'Man in the Middle' attack), the 
   checkbox marked <b>Verify system certificates before sending any 
   passwords</b> should be checked. With this box checked, clicking submit 
   retrieves the certificate information for all systems listed, and provides 
@@ -152,7 +153,7 @@
   be sent without the trust box checked. To add the system or systems,
   click the 'Trust' checkboxes for each row desired and click submit again.
    Mousing over the lock icon for 
-  a row entry will display the certificate information for just that system.
+  a row entry will display the certificate information for just that system. It is important to note that in order to defend against this type of attack, the user must know the certificate fingerprints of client systems prior to the initial key exchange. When the client systems are added, the user can then compare the known certificate fingerprints with the fingerprints displayed by the luci server to verify they match. A mismatch indicates the possibility of an attack.
   <p/>
   <img src="./addsys_33.png"/><br/>
   <b>Figure #5: Certificate Verification Page</b>
@@ -174,11 +175,9 @@
   authenticated. The cluster and subsequent nodes are only added after the
   entire list has been submitted with the Submit button, and all nodes
   authenticate.  <p/>
-
+<p>
 If any nodes fail to authenticate, they appear in the list in red font, so that
-  the password can be corrected and the node list submitted again. Luci has a
-  strict policy about adding a cluster to be managed: A cluster cannot be added
-  unless ALL nodes can be reached and authenticated. 
+  the password can be corrected and the node list submitted again. Luci allows an existing cluster to be added even if one or more nodes is down, unreachable or otherwise non-operational. If any nodes are not authenticated at the time their cluster is added, they must be authenticated when possible, via the "Reauthenticate to Storage or Cluster Systems" form in the "Manage Systems" section located in the "Homebase" tab.</p>
   <p/>When a cluster is added to a luci server, all nodes are also added as general systems so that storage may be managed on them. If this is not desired, the individual systems may be removed from luci, while remote cluster management capability is maintained.<p/>
   NOTE: If an administrator desires to create a new cluster, this capability is
   available on the Cluster tab. This task link is only for adding and managing
@@ -329,7 +328,7 @@
   <p/> 
   <p/> 
   The Add a Node page is similar in look and function to the Add a System
-  page available in the Homebase tab. The system hostname of IP Address is
+  page available in the Homebase tab. The system hostname of IP address is
   entered in the appropriate field along with the password for the
   system. Multiple nodes may be added at once. The user is offered the
   chance to verify the certificate for the new node to be added, just as




More information about the Cluster-devel mailing list