12.12.2012 Views

Festival Speech Synthesis System: - Speech Resource Pages

Festival Speech Synthesis System: - Speech Resource Pages

Festival Speech Synthesis System: - Speech Resource Pages

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Every effort has been made to minimise the risk of unauthorised access through <strong>Festival</strong> and a number of levels of<br />

security are provided. However with any program offering socket access, like httpd, sendmail or ftpd there is<br />

a risk that unauthorised access is possible. I trust <strong>Festival</strong>'s security enough to often run it on my own machine and<br />

departmental servers, restricting access to within our department. Please read the information below before using the<br />

<strong>Festival</strong> server so you understand the risks.<br />

[ < ] [ > ] [ > ] [Top] [Contents] [Index] [ ? ]<br />

28.3.1 Server access control<br />

The following access control is available for <strong>Festival</strong> when running as a server. When the server starts it will usually<br />

start by loading in various commands specific for the task it is to be used for. The following variables are used to<br />

control access.<br />

server_port<br />

A number identifying the inet socket port. By default this is 1314. It may be changed as required.<br />

server_log_file<br />

If nil no logging takes place, if t logging is printed to standard out and if a file name log messages are<br />

appended to that file. All connections and attempted connections are logged with a time stamp and the name<br />

of the client. All commands sent from the client are also logged (output and data input is not logged).<br />

server_deny_list<br />

If non-nil it is used to identify which machines are not allowed access to the server. This is a list of regular<br />

expressions. If the host name of the client matches any of the regexs in this list the client is denied access.<br />

This overrides all other access methods. Remember that sometimes hosts are identified as numbers not as<br />

names.<br />

server_access_list<br />

If this is non-nil only machines whose names match at least one of the regexs in this list may connect as<br />

clients. Remember that sometimes hosts are identified as numbers not as names, so you should probably<br />

exclude the IP number of machine as well as its name to be properly secure.<br />

server_passwd<br />

If this is non-nil, the client must send this passwd to the server followed by a newline before access is given.<br />

This is required even if the machine is included in the access list. This is designed so servers for specific tasks<br />

may be set up with reasonable security.<br />

(set_server_safe_functions FUNCNAMELIST)<br />

If called this can restrict which functions the client may call. This is the most restrictive form of access, and<br />

thoroughly recommended. In this mode it would be normal to include only the specific functions the client can<br />

execute (i.e. the function to set up output, and a tts function). For example a server could call the following at<br />

set up time, thus restricting calls to only those that `festival_client' --ttw uses.<br />

(set_server_safe_functions<br />

'(tts_return_to_client tts_text tts_textall Parameter.set))<br />

Its is strongly recommend that you run <strong>Festival</strong> in server mode as userid nobody to limit the access the process will<br />

have, also running it in a chroot environment is more secure.<br />

For example suppose we wish to allow access to all machines in the CSTR domain except for<br />

holmes.cstr.ed.ac.uk and adam.cstr.ed.ac.uk. This may be done by the following two commands<br />

(set! server_deny_list '("holmes\\.cstr\\.ed\\.ac\\.uk"<br />

"adam\\.cstr\\.ed\\.ac\\.uk"))<br />

(set! server_access_list '("[^\\.]*\\.cstr\\.ed\\.ac\\.uk"))<br />

This is not complete though as when DNS is not working holmes and adam will still be able to access the server<br />

(but if our DNS isn't working we probably have more serious problems). However the above is secure in that only<br />

machines in the domain cstr.ed.ac.uk can access the server, though there may be ways to fix machines to<br />

identify themselves as being in that domain even when they are not.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!