Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 976 Categories, Downloaded 29.543.837 Times

MUNGE Uid N Gid Emporium 0.5.8

  Date Added: November 24, 2010  |  Visits: 1.937

MUNGE Uid N Gid Emporium

Report Broken Link
Printer Friendly Version


Product Homepage
Download (75 downloads)



MUNGE Uid N Gid Emporium is an authentication service for creating and validating credentials. It is designed to be highly scalable for use in an HPC cluster environment. It allows a process to authenticate the UID and GID of another local or remote process within a group of hosts having common users and groups. These hosts form a security realm that is defined by a shared cryptographic key. Clients within this security realm can create and validate credentials without the use of root privileges, reserved ports, or platform-specific methods. Rationale The need for MUNGE arose out of the HPC cluster environment. Consider the scenario in which a local daemon running on a login node receives a client request and forwards it on to remote daemons running on compute nodes within the cluster. Since the user has already logged on to the login node, the local daemon just needs a reliable means of ascertaining the UID and GID of the client process. Furthermore, the remote daemons need a mechanism to ensure the forwarded authentication data has not been subsequently altered. A common solution to this problem is to use Unix domain sockets to determine the identity of the local client, and then forward this information on to remote hosts via trusted rsh connections. But this presents several new problems. First, there is no portable API for determining the identity of a client over a Unix domain socket. Second, rsh connections must originate from a reserved port; the limited number of reserved ports available on a given host directly limits scalability. Third, root privileges are required in order to bind to a reserved port. Finally, the remote daemons have no means of determining whether the client identity is authentic. Overview A process creates a credential by requesting one from the local MUNGE service. The encoded credential contains the UID and GID of the originating process. This process sends the credential to another process within the security realm as a means of proving its identity. The receiving process validates the credential with the use of its local MUNGE service. The decoded credential provides the receiving process with a reliable means of ascertaining the UID and GID of the originating process. This information can be used for accounting or access control decisions. The contents of the credential (including any optional payload data) are encrypted with a key shared by all munged daemons within the security realm. The integrity of the credential is ensured by a message authentication code (MAC). The credential is valid for a limited time defined by its time-to-live (TTL). The daemon ensures unexpired credentials are not replayed on a particular host. Decoding of a credential can be restricted to a particular user and/or group ID. The payload data can be used for purposes such as embedding the destinations address to ensure the credential is only valid on a specific host. The internal format of the credential is encoded in a platform-independent manner. And the credential itself is base64 encoded to allow it to be transmitted over virtually any transport. Whats New in This Release: - A bug was fixed that caused stack corruption on AMD-64 when using Libgcrypt.. This server is a central point for development, distribution and maintainance of software. It runs on Savane.

Requirements: No special requirements
Platforms: Linux
Keyword: Authentication Authentication Service Credential Emporium Gid Miscellaneous Munge Process Security Service Uid
Users rating: 0/10

License: Freeware Size: 358.4 KB
USER REVIEWS
More Reviews or Write Review


MUNGE UID N GID EMPORIUM RELATED
Security Tools  -  GNU Generic Security Service Library 0.1.5
GNU Generic Security Service Library provides a Generic Security Service (GSS-API) implementation. It is used by network applications to provide security services, such as authenticating SMTP/IMAP, via the GSSAPI SASL mechanism.
1.83 MB  
Libraries  -  Catalyst::Plugin::Authentication::Credential::BBAuth 0.03
Catalyst::Plugin::Authentication::Credential::BBAuth is a Yahoo! Browser-Based Authentication for Catalyst. SYNOPSIS use Catalyst qw( Authentication Authentication::Credential::BBAuth Session Session::Store::FastMmap...
3.07 KB  
Libraries  -  Net::SynchroEdit::Service 0.039r2
Net::SynchroEdit::Service is a Perl extension for SynchroEdit response service functionality. SYNOPSIS use Net::SynchroEdit::Service; my $conn = new Net::SynchroEdit::Service; $conn->connect("localhost", 7962, "root", "secret");...
7.17 KB  
Customer Relation Tools  -  ServiceDesk Lite 2016 (Free Service CRM) 1.1
Service Desk Lite is free ready to use service management software that enables you to manage Service contracts/AMC and customer complaint life cycle from complaint initiation, assignment to closure in a very simple way. For service oriented...
5.06 MB  
Business  -  ServiceDesk Lite 2014 10.5
Service Desk Lite is free ready to use service management software that enables you to manage Service contracts/AMC and customer complaint life cycle from complaint initiation, assignment to closure in a very simple way. For service oriented...
5.1 MB  
Utilities  -  Gus Johnson Ford Service 1.0.3
Stay on top of your next oil service, tire rotation or any standard maintenance. Gus Johnson Ford Service allows you to choose your service schedule and notify you on the latest service deals. This easy to use interface allows for minimal clicks...
6.4 MB  
Productivity  -  My Field Service 1.5
My Field Service will help you keep track of your service with a simple layout. This app is design for the entire family to use. The first screen is made just to add, second screen has a summary by month & year. Finally, last screen has a...
3.6 MB  
Business  -  Nexus Service Manager Mobile 2.0.0.0
Nexus Service Manager Mobile is a client application for service technicians to view what jobs are schedules for a selected day and view the job details. This application requires a connection to the customer's server running a Nexus Service...
1024 KB  
Security Tools  -  Rozmic Firewall 1.1
Rozmic Firewall is an automated security service that protects your Internet communications from spam and viruses. It operates at the gateway level, and scans all traffic entering your network. It's automated and supervised by security...
6.67 MB  
MP3 Tools  -  AutoServices 2.00
The car service automation process management. Get service orders and execute them. The customer put service call to company. The application handles all the process of car servicing, starting from the gate reception, to disassembling and...
10.68 MB  
NEW DOWNLOADS IN LINUX SOFTWARE, SECURITY TOOLS
Linux Software  -  Polling Autodialer Software 3.4
ICTBroadcast Auto Dialer software has a survey campaign for telephone surveys and polls. This auto dialer software automatically dials a list of numbers and asks them a set of questions that they can respond to, by using their telephone keypad....
488 B  
Linux Software  -  Total Video Converter Mac Free 3.5.5
Total Video Converter Mac Free developed by EffectMatrix Ltd is the official legal version of Total Video Converter which was a globally recognized brand since 2006. Total Video Converter Mac Free is a free but powerful all-in-one video...
17.7 MB  
Linux Software  -  Skeith mod_log_sql Analyzer 2.10beta2
Skeith is a php based front end for analyzing logs for Apache using mod_log_sql.
47.5 KB  
Linux Software  -  SLAX 6.0+
Slax is a modern, portable, small and fast Linux operating system with a modular approach and outstanding design. Despite its small size, Slax provides a wide collection of pre-installed software for daily use, including a well organized graphical...
190 KB  
Linux Software  -  GTK+ 2.5
GTK+, which stands for the GIMP Toolkit, is a library for creating graphical user interfaces for the X Window System. It is designed to be small, efficient, and flexible. GTK+ is written in C with a very object-oriented approach. Language bindings...
60 MB  
Security Tools  -  Free AntiSpyware 7.2.5
As powerful and professional anti-spyware software, Free AntiSpyware has ability to detect & stop the latest and most malicious programs that are doing harm to your computer and breaking your privacy. This free spyware remover software helps...
128.08 MB  
Security Tools  -  paraproxy 1.1
paraproxy is a supplement library for paramiko which adds support for SSH2 proxy commands. #md5=0c7041e8d2d7e49b09df526bba3efb28 #md5=1fbb4f888f40a01439ff27458c6210eb #md5=493c0f426e376427c30f3f39ebc8dac1
20.48 KB  
Security Tools  -  pam_smxs 1.6
pam_smxs is a PAM module that authenticates a user using challenge-response. All tokens that support ANSI X9.9 are currently supported and it provides full support for CryptoCard RB1 tokens.
522.24 KB  
Security Tools  -  DoudouLinux 2011-11
DoudouLinux [1] is a system specially designed for children to make computer use as easy and pleasant as possible for them (and for their parents too! [2]). DoudouLinux provides tens of applications that suit children from 2 to 12 years and tries...
964.17 MB  
Security Tools  -  django-auth-ldap 1.0.19
This authentication backend enables a Django project to authenticate against any LDAP server. To use it, add django_auth_ldap.backend.LDAPBackend to AUTHENTICATION_BACKENDS. It is not necessary to add django_auth_ldap to INSTALLED_APPLICATIONS...
30.72 KB