LISTSERV mailing list manager LISTSERV 16.5

Help for XROOTD-DEV Archives


XROOTD-DEV Archives

XROOTD-DEV Archives


XROOTD-DEV@LISTSERV.SLAC.STANFORD.EDU


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

XROOTD-DEV Home

XROOTD-DEV Home

XROOTD-DEV  June 2018

XROOTD-DEV June 2018

Subject:

Re: Macaroons support for XrdHttp

From:

Michal Kamil Simon <[log in to unmask]>

Reply-To:

xrootd developers' list for Scalla/xrootd repository and related issues <[log in to unmask]>

Date:

Fri, 22 Jun 2018 14:33:22 +0000

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (151 lines)

Hi Brian,

I've created a repo for you:
https://github.com/xrootd/xrootd-macaroons

How do we proceed with versioning of external components?
Do we keep it in line with core xrootd packages?

Cheers,
Michal
________________________________________
From: Hanushevsky, Andrew B. [[log in to unmask]]
Sent: 20 June 2018 22:19
To: [log in to unmask]
Cc: Andreas Joachim Peters; Fabrizio Furano; Paul Millar; Fabrizio Furano; xrootd-dev; Simon, Michal; Oliver Keeble
Subject: Re: Macaroons support for XrdHttp

Actually, it would be good if the macaroon contained UID/GID (or whatever
you consider describing ownership) from the get go -- even if it is not
used for certain system. These things evolve quickly and I don't think it
would be good to constrain the evolution simply because we don't have
enough information. Putting this in after the fact is usually far more
problematic than one initially assumes.

Andy

On Wed, 20 Jun 2018, Brian Bockelman wrote:

> Hi Andreas,
>
> dCache currently embeds the UID / GID(s) of the original entity that generated the token into the token itself.
>
> XRootD does not really have a concept of "file ownership" (authorization module is completely separated from the filesystem module), so I don't currently include this in the XRootD-generated macaroon.
>
> As I've been trying out a few use cases locally (locally, XRootD sits on top of HDFS which, like EOS, does have file ownership), I'm hitting ownership issues like you outline below.  I think the XRootD-generated token is going to include the user and group info too for the case where XRootD is sitting on top of distributed filesystems.
>
> Brian
>
>> On Jun 20, 2018, at 7:33 AM, Andreas-Joachim Peters <[log in to unmask]> wrote:
>>
>> I have one question if you use macaroons for writing. If I allow with a macaroon to write into 'my' directory, will a file be created with my identity or the identity of the authenticated client with the macaroon? Or is the identity for creatoin also specified in the macaroon? Reading is clear.
>>
>> Cheers Andreas.
>>
>>
>> On Wed, Jun 20, 2018 at 1:58 PM, Fabrizio Furano <[log in to unmask] <mailto:[log in to unmask]>> wrote:
>> Hi,
>>
>> On 20.06.18 12:56, Paul Millar wrote:
>>> Hi Fabrizio,
>>>
>>> On 20/06/18 11:48, Fabrizio Furano wrote:
>>>>   Paul, surely it's available in DPM 1.10 (latest in epel)
>>>
>>> Excellent.
>>>
>>> Could you say which option needs tweaking in order to enable the support?
>>>
>>> The DPM v1.10 release notes don't seem to mention macaroons much.
>>
>>  indeed, we don't consider them a released feature ready for
>> prime time. Eventually they will.
>>
>>  To enable then, one needs to make sure that the Apache config
>> contains:
>>  - (in the Location match for /dpm) NSMacaroonSecret <secret>
>>  - SSLVerifyClient must be "optional"
>>
>> Cheers
>> Fabrizio
>>
>>
>>>
>>>>   It may be available on slightly older DPMs if the sysadmin has
>>>> upgraded the HTTP frontend alone (lcgdm-dav 0.20). Needless to say,
>>>> I don't encourage package alchemies in prod setups.
>>>
>>> :-D
>>>
>>>>   About the authentication, I take the statement "every authenticated
>>>> client",
>>>> which in our world may mean X509, X509/VOMS
>>>
>>> Yes, it includes X.509.  For dCache, this is also true for
>>> OpenID-Connect, Kerberos, username+password and macaroons.
>>>
>>> (You can even use a macaroon when requesting a fresh macaroon.)
>>>
>>> I'm working on adding SciToken support now.
>>>
>>>>   That was for generating. I am a bit puzzled about authorization. Really
>>>> you don't apply any kind of authorization to generate a macaroon? Do you
>>>> check everything only when a macaroon is received?
>>>
>>> Yes, beyond a global enable/disable switch.
>>>
>>> The CPU cost of generating a macaroon is rather trivial.
>>>
>>> In the Birgisson et al paper, they measured the crypo overhead of
>>> minting a macaroon (in Python) at 20 µs, plus 55 µs per caveat.  For
>>> comparison they measured RSA keygen (as used by SciToken) as taking 54
>>> ms (54000 µs) in OpenSSL.  So a typical macaroon is about two orders of
>>> magnitude faster to generate than an RSA key-pair.
>>>
>>> There's no problem with multiple requests filling up any storage:
>>> typically macaroons share the same secret.
>>>
>>> It doesn't authorise users to do anything they can't already do,
>>> especially with X.509 proxies.
>>>
>>> For example, consider a user that generates and emails a friend a
>>> macaroon that grants the bearer the ability to read some data.
>>>
>>> That user could email their friend an X.509 proxy.
>>>
>>> Failing that, they could even download the data and simply email it to
>>> their friend.
>>>
>>> At least with macaroons, the user can limit activity to reading data (no
>>> deletion) and only a specific portion of the namespace.
>>>
>>>>   For the records, the DPM implementation is considered experimental
>>>> because it may miss something... however it's good to gain experience.
>>>
>>> Agreed.
>>>
>>> Cheers,
>>>
>>> Paul.
>>
>>
>>
>> ########################################################################
>> Use REPLY-ALL to reply to list
>>
>> To unsubscribe from the XROOTD-DEV list, click the following link:
>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1 <https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1>
>>
>>
>> Use REPLY-ALL to reply to list
>>
>> To unsubscribe from the XROOTD-DEV list, click the following link:
>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1 <https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1>
>

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-DEV list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1

Top of Message | Previous Page | Permalink

Advanced Options


Options

Log In

Log In

Get Password

Get Password


Search Archives

Search Archives


Subscribe or Unsubscribe

Subscribe or Unsubscribe


Archives

August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010

ATOM RSS1 RSS2



LISTSERV.SLAC.STANFORD.EDU

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager

Privacy Notice, Security Notice and Terms of Use