25.06.2015 Views

Administering Platform LSF - SAS

Administering Platform LSF - SAS

Administering Platform LSF - SAS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

About User Authentication<br />

Security of <strong>LSF</strong> authentication<br />

UNIX<br />

Windows<br />

All authentication methods supported by <strong>LSF</strong> depend on the security of the<br />

root account on all hosts in the cluster. If a user can get access to the root<br />

account, they can subvert any of the authentication methods. There are no<br />

known security holes that allow a non-root user to execute programs with<br />

another user’s permission.<br />

Some system adminstrators have particular concerns about security schemes<br />

involving RFC 1413 identification daemons. When a request is coming from an<br />

unknown host, there is no way to know whether the identification daemon on<br />

that host is correctly identifying the originating user.<br />

<strong>LSF</strong> only accepts job execution requests that originate from hosts within the<br />

<strong>LSF</strong> cluster, so the identification daemon can be trusted.<br />

The system environment variable <strong>LSF</strong>_ENVDIR is used by <strong>LSF</strong> to obtain the<br />

location of lsf.conf, which points to the <strong>LSF</strong> configuration files. Any user<br />

who can modify system environment variables can modify <strong>LSF</strong>_ENVDIR to<br />

point to their own configuration and start up programs under the lsfadmin<br />

account.<br />

All external binaries invoked by the <strong>LSF</strong> daemons (such as esub, eexec, elim,<br />

eauth, and queue level pre- and post-execution commands) are run under the<br />

lsfadmin account.<br />

By default, external authentication is installed on UNIX. If you use the<br />

identification protocol (identd) for authentication, <strong>LSF</strong> uses a port in the UNIX<br />

privileged port range, so it is not possible for an ordinary user to start a hacked<br />

identification daemon on an <strong>LSF</strong> host.<br />

On UNIX, this means that authentication is done using privileged ports and<br />

binaries that need to be authenticated (for example, bsub) are installed setuid<br />

to root.<br />

By default, external authentication is installed on Windows. You may disable<br />

external authentication by disabling the <strong>LSF</strong>_AUTH parameter in the lsf.conf<br />

file.<br />

On Windows, privileged ports authentication does not provide any security<br />

because Windows does not have the concept of setuid binaries and does not<br />

restrict which binaries can use privileged ports. A security risk exists in that a<br />

user can discover the format of <strong>LSF</strong> protocol messages and write a program<br />

that tries to communicate with an <strong>LSF</strong> server. The <strong>LSF</strong> default external<br />

authentication should be used where this security risk is a concern.<br />

Only the parameters <strong>LSF</strong>_STARTUP_USERS and <strong>LSF</strong>_STARTUP_PATH are used<br />

on Windows. You should ensure that only authorized users modify the files<br />

under the %SYSTEMROOT% directory.<br />

Once the <strong>LSF</strong> services on Windows are started, they will only accept requests<br />

from <strong>LSF</strong> cluster administrators. To allow other users to interact with the <strong>LSF</strong><br />

services, you must set up the lsf.sudoers file under the directory specified<br />

by the %SYSTEMROOT% environment variable.<br />

See the <strong>Platform</strong> <strong>LSF</strong> Reference for the format of the lsf.sudoers file.<br />

498<br />

<strong>Administering</strong> <strong>Platform</strong> <strong>LSF</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!