You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@uima.apache.org by de...@apache.org on 2013/08/27 15:42:53 UTC
svn commit: r1517817 -
/uima/sandbox/uima-ducc/trunk/uima-ducc-duccdocs/src/site/tex/duccbook/part1/overview.tex
Author: degenaro
Date: Tue Aug 27 13:42:53 2013
New Revision: 1517817
URL: http://svn.apache.org/r1517817
Log:
UIMA-3220 DUCC documentation needs to describe "security" measures
Modified:
uima/sandbox/uima-ducc/trunk/uima-ducc-duccdocs/src/site/tex/duccbook/part1/overview.tex
Modified: uima/sandbox/uima-ducc/trunk/uima-ducc-duccdocs/src/site/tex/duccbook/part1/overview.tex
URL: http://svn.apache.org/viewvc/uima/sandbox/uima-ducc/trunk/uima-ducc-duccdocs/src/site/tex/duccbook/part1/overview.tex?rev=1517817&r1=1517816&r2=1517817&view=diff
==============================================================================
--- uima/sandbox/uima-ducc/trunk/uima-ducc-duccdocs/src/site/tex/duccbook/part1/overview.tex (original)
+++ uima/sandbox/uima-ducc/trunk/uima-ducc-duccdocs/src/site/tex/duccbook/part1/overview.tex Tue Aug 27 13:42:53 2013
@@ -236,3 +236,44 @@
\end{itemize}
\end{description}
+
+ \section{Security Measures}
+ The following DUCC security measures are provided:
+
+ \begin{description}
+ \item[command line interface] The CLI employs HTTP to send requests
+ to the DUCC controller. The CLI creates and employs public and private
+ security keys in the user's home directory for authentication of HTTP
+ requests. The controller validates requests via these same security keys.
+ \item[webserver] The webserver facilitates operational control and
+ therefore authentication is desirable.
+ \begin{itemize}
+ \item[\textit{user}] Each user has the ability to control certain aspects of
+ only his/her active submissions.
+ \item[\textit{admin}] Each administrator has the ability to control certain
+ aspects of any user's active submissions, as well as modification of some
+ DUCC operational characteristics.
+ \end{itemize}
+ A simple interface is provided so
+ that an installation can plug-in a site specific authentication mechanism
+ comprising userid and password.
+ \item[ActiveMQ] TBD.
+ \end{description}
+
+ \section{Security Issues}
+ The following DUCC security issues should be considered:
+
+ \begin{description}
+ \item[submit transmission 'sniffed'] In the event that the DUCC submit
+ command is 'sniffed' then the user authentication mechanism is compromised
+ and user masquerading is possible. That is, the userid encryption mechanism
+ can be exploited such that user A can submit a job pretending to be user B.
+ \item[user \textit{ducc} password compromised] In the event that the \textit{ducc}
+ user password is compromised then the root privileged command
+ \textbf{ducc\_ling} can be used to become any other user except root.
+ \item[user \textit{root} password compromised] In the event that the
+ \textit{root} user password is compromised DUCC provides no protection.
+ That is, compromising the root user is equivalent to compromising the DUCC
+ user password.
+ \end{description}
+
\ No newline at end of file