Installing SoftBench
Setting Up Network-Distributed Operation
Customizing Subprocess Control
Chapter 656
Controlling Access and Security in SoftBench
Remote execution of SoftBench Debugger and remote compiles from
SoftBench Builder require that the inetd process be configured and
running on the remote system. The normal installation procedures
configure the inetd automatically, and the networking services
described in the Installing and Administering LAN/9000 manual are
required.
The inetd.sec file is described in detail in the inetd.sec(4) reference
page.
If SoftBench is to be run on a system connected to a network, it should be
configured to restrict access to only the work-group that requires
SoftBench. This security model is very similar to the X model in which
/etc/X0.hosts is used to restrict access to the service.
The "mserve" (Message Server) and "spc" (Sub-Process Control) services,
defined by SoftBench, are automatically restricted in inetd.sec by the
customization script to:
• Host name of the system if it is running standalone.
• Nodes in the cluster if it is a cluster system.
To provide access from systems other than the above, edit the inetd.sec
file manually. It is advisable to keep the access list down to a minimum,
as these services allow access to the system by anyone connecting to the
port (just as X11 does).