Sun Certified Solaris(tm) 9 System and Network Administrator All-in-One Exam Guide

The SMC operates by collecting data from systems, providing an interface for viewing that data, and allowing administrative tasks to be executed on the basis of that data. Different servers can store localized toolboxes. Alternatively, if a high-resolution graphics card and/or monitor is not available, SMC can be started with a command-line interface.

The command that starts the SMC is /usr/sadm/bin/smc . This assumes that SMC is to be opened for operations. An alternative mode of operation is provided by the smc edit mode, where toolboxes can be modified or updated. The following options are available to the smc command when starting up:

The format of data in an auth-data file is as follows :

hostname=ivana username=root password=my1asswd rolename=su rolepassword=su1asswd

Of course, any auth-data file should be read-only by root, or by the user who is assigned the role of SMC management. However, there is always an inherent risk in storing passwords plaintext in a file on any file system, because it could be removed and mounted on another system and its contents read directly. Alternatively, gaining unauthorized access to the auth-data file may allow a cracker to obtain administrative access to a large number of servers whose authentication tokens are stored in the file.

Tip  

One file is normally created for every server whose credentials must be locally stored.

Exercise 29-1 Using SMC     Start SMC using a set of credentials stored in an auth-data file. Can you identify any security weaknesses with this approach?

There are a number of different Java options that may be useful for the initialization of the SMC that can be passed using the “J option. These options include the following:

Exercise 29-2 SMC and Java     Start SMC using a set of Java options that minimize the amount of memory utilized initially, but allow for a maximum of 64MB of RAM to be utilized. Monitor the performance of the application using prstat . Does it ever come close to consuming the maximum amount of RAM allocated to the JVM?

 
 
   

Категории