Chapter 3. Cluster Systems Management security infrastructure 29
To ensure that ctcasd uses the correct public key during the encryption process,
the public keys in the trusted host list (THL) file are associated with the host
name of the node. For this reason, it is necessary that all nodes within the CSM
cluster (including the management server) resolve names identically.
First, ctcasd encrypts the session key with the target host’s public key derived
from the THL file. This ensures that only the target node can decrypt this session
key with its private key, and data privacy is ensured.
To ensure data integrity for the host credentials, ctcasd now encrypts the whole
credential data structure using the initiator’s private key. Everyone can decrypt
the data block with the sender’s public key, but the target node can be sure it was
sent by the expected node.
The distribution of public keys to all nodes is performed by CSM. By adding a
node to the CSM cluster, CSM runs RSCT commands to achieve the public key
exchange between the management server and its nodes.
The public key exchange is done over the network. During this exchange, the
network must be secure against tracing and spoofing, because the keys are
binded to a node within the cluster.
In the current version, the host keys generated by ctcasd do not expire, but they
can be updated manually as described in 6.1.4, “The ctcasd daemon key files” on
page 84.
3.2.5 Identity mapping service
The identity mapping (IDM) service result is used for authorization. The IDM
service maps the network identities to local identities if there is a mapping rule
specified in the configuration files (called maps).
Important: To ensure identical host name resolution, all participating cluster
members should use a method for name resolution that gives
identical
results
on all nodes in a CSM cluster. The name resolution method and order can be
changed in /etc/netsvc.conf (for AIX systems). All hosts should also use either
short or fully qualified host names. If the cluster consists of nodes in different
domains, fully qualified host names
must
be used.
Important: With CSM, it is not possible to disable the public key exchange. If
you feel that your network is not secure enough, you should verify the keys on
the management server and nodes manually. To verify the keys, refer to 6.1.8,
“Verifying exchanged public host keys” on page 89.