[ Bottom of Page | Previous Page | Next Page | Contents | Index | Library Home | Legal | Search ]

Commands Reference, Volume 1

ctsthl Command

Purpose

Displays and modifies the contents of a cluster security services trusted host list file.

Syntax


ctsthl {-a | -d | -h | -l}
[-f trusted_host_list_file] [-n host_name]
[-m method]
[-p identifier_value]

Description

This command displays and modifies the contents of a cluster security services trusted host list file. Unless the -f flag is provided, the command performs its operations on the default trusted host list file /var/ct/cfg/ct_has.thl. ctsthl allows the command user to add, modify, or remove entries in the trusted host list for specific hosts. When a host is added or modified, the command user must provide the following information:

The command validates the generation method name, converts the character string representation to binary form, and creates a new entry within the trusted host list file for this host. Generally, the host identifier value is quite large. For instance, the character representation of a RSA 1024-bit generated identifier is over 256 characters in size. This can cause a problem on systems such as AIX, which limit the command line length to a smaller size. To avoid this problem, use the ctsthl -a command from a shell script, or in conjunction with the xargs command.

When the contents of the trusted host list file are displayed, ctsthl provides the following information for each entry:

Flags

-a
Adds or replaces a host entry to the trusted host list. The -n, -m, and -p flags must also be provided. If the host specified already exists in the trusted host list file, the entry for that host is modified to match the information provided to this command.
-d
Removes a host's entry from the trusted host list file. The -n flag must also be provided to indicate the host being removed.
-h
Writes the command's usage statement to standard output.
-l
Instructs the command to list the contents of the trusted host list file. If this flag is combined with the -a or -d flags, the contents are displayed after these flags are processed.
-f trusted_host_list_file
Instructs the command to display or modify the trusted host list stored in the named file. If this flag is not provided, the default trusted host list file /var/ct/cfg/ct_has.thl is used.
-n host_name
Specifies the name of the host to be used in this operation. The name should be a name by which the host is known to the cluster's network.
-m method
Instructs the command to use the specified key generation method in creating the host identifier keys. You can use the ctskeygen -i command to display valid values for method.
-p identifier_value
Specifies the host identifier value to be stored for the host. This is a character string that represents the hexadecimal value of the host identifier to be stored for this identifier. For example, if the host identifier value is 0xB87C55E0, this flag would be specified as -p b87c55e0. Generally, host identifier keys will be much longer than this example, making it too large for the command line limit on some systems such as AIX. If the resulting command line is too large, use xargs to extend it, or issue the command from a shell script.

Parameters

network_ID
Specifies the security network identifier to be mapped. This should be an identity that can be assumed by a client application of a trusted service.

Security

Permissions on the ctsthl command permit only root to run the command.

Exit Status

0
ctsidmck successfully found a mapped identity for network_ID.
3
The command detected a failure in the operation of the cluster security library mechanism pluggable module (MPM) corresponding to the security mechanism what was requested. The command was unable to search for a possible mapped identity for network_ID in this case. This failure may be accompanied by descriptive output indicating the nature of the MPM failure. Consult this output and perform any recommended actions.
4
The caller invoked the command incorrectly, omitting required options and arguments, or using mutually exclusive options. The command terminated without attempting to find a mapped identity for network_ID.
6
A memory allocation request failed during the operation of the command. The command was unable to search for a possible mapped identity for network_ID in this case.
21
The command was unable to locate any of the identity mapping definition files on the local system. The command was unable to search for a possible mapped identity for network_ID in this case. Verify that at least one identity mapping definition file exists on the system.
22
The command was unable to dynamically load the cluster security library mechanism pluggable module (MPM) corresponding to the security mechanism what was requested. The module may be missing, corrupted, or one of the shared libraries used by this module may be missing or corrupted. The command was unable to search for a possible mapped identity for network_ID in this case. This failure may be accompanied by descriptive output indicating the nature of the MPM failure. Consult this output and perform any recommended actions.
37
At least one of the identity mapping definition files on the system appears to be corrupted. The command was unable to search for a possible mapped identity for network_ID in this case. Verify that none of the identity mapping files are corrupted, truncated, or contain syntax errors.
38
ctsidmck could not locate a mapped identity for network_ID. No entry within any of the identity mapping definition files yielded a mapped identity for the specified security network identifier.

Restrictions

Standard Output

When the -h flag is specified, this command's usage statement is written to standard output.

Standard Error

Descriptive information for any detected failure condition is written to the standard error.

Examples

  1. To view the contents of the trusted host contained in the file /mythl, enter:
    ctsthl -l -f /mythl
  2. To add an entry to the default trusted host list file for the system zathras.ibm.com, enter:
    ctsthl -a -n zathras.ibm.com -m rsa1024 -p 120400a9...
    Note that this example does not complete the entire identifier value.
  3. To remove an entry for zathras.ibm.com from the default trusted host list, enter:
    ctsthl -d -n zathras.ibm.com

Location

/usr/sbin/rsct/bin/ctsthl
Contains the ctsthl command

Files

/usr/sbin/rsct/cfg/ctsec_map.global
The default identity mapping definition file. This file contains definitions required by the RSCT cluster trusted services in order for these systems to execute properly immediately after software installation. This file is ignored if the cluster-wide identity mapping definition file /var/ct/cfg/ctsec_map.global exists on the system. Therefore, any definitions within this file should also be included in the cluster-wide identity mapping definition file, if that file exists.
/var/ct/cfg/ctsec_map.local
Local override to the cluster-wide identity mapping definitions. Definitions within this file are not expected to be shared between nodes within the cluster.
/var/ct/cfg/ctsec_map.global
Cluster-wide identity mapping definitions. This file is expected to contain identity mapping definitions that are common throughout the cluster. If this file exists on the system, the default identity mapping definition file is ignored. Therefore, if this file exists, it should also contain any entries that would also be found in the default identity mapping definition file.

Related Information

Commands: ctskeygen

Daemons: ctcasd

Files: ct_has.thl

[ Top of Page | Previous Page | Next Page | Contents | Index | Library Home | Legal | Search ]