home *** CD-ROM | disk | FTP | other *** search
-
-
-
- SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM)))) SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM))))
-
-
-
- NNNNAAAAMMMMEEEE
- satmpd - Security Attribute Token Mapping Protocol Daemon
-
- SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS
- ////uuuussssrrrr////bbbbiiiinnnn////ssssaaaattttmmmmppppdddd [ ----cccc _c_o_n_f_i_g_d_i_r ] [ ----dddd _d_e_b_u_g-_o_p_t_i_o_n_s ] [ ----llll _l_o_g_f_i_l_e ] [ ----pppp
- _p_o_r_t ]
-
- DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
- A daemon that implements the Security Attribute Token Mapping Protocol,
- (SATMP). It is also known as the Token Mapping Daemon.
-
- OOOOPPPPTTTTIIIIOOOONNNNSSSS
- ----cccc _c_o_n_f_i_g_d_i_r
- Set the location of satmpd configuration files to _c_o_n_f_i_g_d_i_r.
-
- ----dddd _d_e_b_u_g-_o_p_t_i_o_n_s
- Turn on the requested debugging options. These must be entered as a
- single option or as a comma-separated list with no whitespace.
- Acceptable values are STARTUP, FILE_OPEN, DIR_OPEN, OPEN_FAIL,
- OPENDIR_FAIL, PROTOCOL, and ALL. The ----dddd option may be given more
- than once. When using the -dddd option _s_a_t_m_p_d does not daemonize itself
- and runs in the foreground. Operating in this mode at bootup will
- cause the host to hang waiting for satmpd to exit.
-
- ----llll _l_o_g_f_i_l_e
- Direct debugging output to file _l_o_g_f_i_l_e.
-
- ----pppp _p_o_r_t
- Force satmpd to listen on alternate port _p_o_r_t.
-
- CCCCOOOONNNNFFFFIIIIGGGGUUUURRRRAAAATTTTIIIIOOOONNNN FFFFIIIILLLLEEEESSSS
- The following configuration files are required. It is an unrecoverable
- error if any of these are missing.
-
- AAAATTTTTTTTRRRRIIIIDDDDSSSS
- This file contains human-readable names of the SATMP attributes plus
- their numerical values. Each ATTRIDS entry consists of a single line
- with the following format:
-
- <attribute>:<number>
-
- The AAAATTTTTTTTRRRRIIIIDDDDSSSS file supplied with your system contains the following
- entries:
-
- SEN_LABEL:0
- NATIONAL_CAVEATS:1
- INTEGRITY_LABEL:2
- INFO_LABEL:3
- PRIVILEGES:4
- AUDIT_ID:5
- IDS:6
- CLEARANCE:7
-
-
-
- PPPPaaaaggggeeee 1111
-
-
-
-
-
-
- SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM)))) SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM))))
-
-
-
- AUDIT_INFO:8
- UNASSIGNED_9:9
- ACL:10
- UNASSIGNED_11:11
-
- The following attributes are not supported under Trusted IRIX and are
- silently ignored: NATIONAL_CAVEATS, INFO_LABEL, CLEARANCE, AUDIT_INFO,
- ACL, UNASSIGNED_9, and UNASSIGNED_11.
-
- RRRREEEEQQQQAAAATTTTTTTTRRRR
- This file contains human-readable names of the attributes all clients
- must support. These names must match those in ATTRIDS. For example:
-
- SEN_LABEL
- PRIVILEGES
- ACL
-
- WWWWEEEEIIIIGGGGHHHHTTTTSSSS
- This file contains information regarding weights assigned to domains of
- translation. When the local and remote host have more than one domain of
- translation in common for a given attribute, the weight is used to
- determine which domain of translation is used. Weight entries should be
- listed in descending order within the file, one per line, with the
- following format:
-
- <attribute>:<domain>:<weight>
-
- For example:
-
- ACL:SGI:255
- ACL:DECMLS:250
- ACL:SUN:245
-
- llllooooccccaaaallllmmmmaaaapppp
- This file contains remote-to-local attribute mapping information. Each
- entry consists of one-line with the following format:
-
- <attribute>:<domain>:<source>:<dest>
-
- The meaning of <source> and <dest> is attribute specific. If the map in
- any domain has a <source> field with the value "NATIVE_MAPPING", the map
- is ignored and SGI native mapping is assumed. Otherwise, the meaning of
- <source> and <dest> is as follows:
-
- PPPPRRRRIIIIVVVVIIIILLLLEEEEGGGGEEEESSSS
-
- <source> is the remote representation, as one "word". The remote
- representation of the privilege set is broken up into words, which are
- then matched against <source>.
-
-
-
-
-
-
- PPPPaaaaggggeeee 2222
-
-
-
-
-
-
- SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM)))) SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM))))
-
-
-
- <dest> is an SGI format capability set. Again, only the effective set
- matters, and a one-to-many mapping is possible.
-
- Examples:
-
- PRIVILEGES:SGI:mac-read:CAP_MAC_READ+e
- PRIVILEGES:SGI:all-privs:all+eip
-
- AAAAUUUUDDDDIIIITTTT____IIIIDDDD
-
- <source> is the remote user name and <dest> is the local user name.
-
- Examples:
-
- AUDIT_ID:SGI:gails:gsmith
- AUDIT_ID:SGI:cbj:charles
-
- IIIIDDDDSSSS
-
- User and group ids are listed on separate lines. For each, <source> is
- the remote name and <dest> is the local name.
-
- Examples:
-
- IDS:SGI:user,gails:gsmith
- IDS:SGI:group,square:wheel
-
- SSSSEEEENNNN____LLLLAAAABBBBEEEELLLL
- IIIINNNNTTTTEEEEGGGGRRRRIIIITTTTYYYY____LLLLAAAABBBBEEEELLLL
-
- For each entry, <source> is the remote representation and <dest> is the
- local representation.
-
- Mandatory access control labels consist of a sensitivity label and an
- integrity label. For each of these, there are some administrative
- labels, which consist only of a type, and other labels, msentcsec and
- mintbiba, that consist of components. Administrative labels are
- represented by entries with the attribute "type". The sensitivity label
- "msentcsec" and the integrity label "mintbiba" are not specified as
- types. Instead, each level or grade and category or division is
- specified on a single line. Note that grades should be specified as
- "level" and division as "category".
-
- Examples:
-
- SEN_LABEL:SGI:type,msenhigh:highadmin
- SEN_LABEL:SGI:level,lords:senate
- SEN_LABEL:SGI:level,commons:house
- SEN_LABEL:SGI:category,crimson:red
- The daemon is implemented to facilitate matching between Trusted IRIX
- representations and those of other vendors, which do not have separate
- types for administrative labels. To map a remote, non Trusted IRIX
-
-
-
- PPPPaaaaggggeeee 3333
-
-
-
-
-
-
- SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM)))) SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM))))
-
-
-
- representation to a local representation, the remote label representation
- is first compared with "type" entries. If it matches in toto, then is
- not a msentcsec or mintbiba label and the local label representation in
- the "type" entry is the complete local representation of that label.
- Otherwise, the remote representation is broken into words. The largest
- subsequence of words is matched against "level" entries. If no
- subsequence matches (in other words, even the first word of the label has
- no match) it is rejected. Otherwise, any remaining words are matched one
- at a time against entries of type "category".
-
- rrrreeeemmmmooootttteeeemmmmaaaapppp
- This file contains local-to-remote attribute mapping information. The
- entries have the same format as in llllooooccccaaaallllmmmmaaaapppp.
-
- The meaning of <source> and <dest> is attribute specific. If the map in
- any domain has a <source> field with the value "NATIVE_MAPPING", the map
- is ignored and SGI native mapping is assumed. Otherwise, the meaning of
- <source> and <dest> is as follows:
-
- PPPPRRRRIIIIVVVVIIIILLLLEEEEGGGGEEEESSSS
-
- <source> is an SGI format capability set. Only the effective capabilities
- are examined. Multiple capabilities may be specified; a many-to-one
- mapping is possible.
-
- <dest> is the remote representation of <source>
-
- Examples:
-
- PRIVILEGES:SGI:CAP_MAC_READ+e:mac-read
- PRIVILEGES:SGI:all+eip:all-privs
-
- AAAAUUUUDDDDIIIITTTT____IIIIDDDD
-
- <source> is the local user name and <dest> is the remote user name.
-
- Examples:
-
- AUDIT_ID:SGI:gsmith:gails
- AUDIT_ID:SGI:charles:cbj
-
- IIIIDDDDSSSS
-
- User and group ids are listed on separate lines. For each, <source> is
- the local name and <dest> is the remote name.
-
- Examples:
-
- IDS:SGI:user,gsmith:gails
- IDS:SGI:group,wheel:square
-
-
-
-
-
- PPPPaaaaggggeeee 4444
-
-
-
-
-
-
- SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM)))) SSSSAAAATTTTMMMMPPPPDDDD((((1111MMMM))))
-
-
-
- SSSSEEEENNNN____LLLLAAAABBBBEEEELLLL
- IIIINNNNTTTTEEEEGGGGRRRRIIIITTTTYYYY____LLLLAAAABBBBEEEELLLL
-
- For each entry, <source> is the local representation and <dest> is the
- remote representation.
-
- Examples:
-
- SEN_LABEL:SGI:type,highadmin:msenhigh
- SEN_LABEL:SGI:level,senate:lords
- SEN_LABEL:SGI:level,house:commons
- SEN_LABEL:SGI:category,red:crimson
-
- The daemon is implemented to correctly map local Trusted IRIX
- representations to those of other vendors, which do not have separate
- types for administrative labels. If the local label is not a msentcsec or
- mintbiba label, then it is matched against "type" entries, and the remote
- label representation is complete. If the local label is a msentcsec or
- mintbiba label, its local representation is divided into a level, or
- grade, and one or more categories, or divisions. The remote label
- representation is constructed by matching the level or grade portion
- against "level" entries, and matching each category or grade against
- "category" entries.
-
- SSSSEEEEEEEE AAAALLLLSSSSOOOO
- iflabel(1m), rhost(1m), samp(7p), satmp(7p), trusted_networking(7),
- tsix(7p).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- PPPPaaaaggggeeee 5555
-
-
-
-