Hi, Derek! Ok, thanks! Nothing is really urgent here, I can use your tarball by now. However I do need a source for building on our opteron servers under Solaris 10. :( Artem. On Fri, 3 Feb 2006, Derek Feichtinger wrote: > Hi, Artem > > I noticed yesterday that the head of the xrootd CVS does no longer build with > autotools (must have been some change in the last week), so I'll investgate > and try to fix it asap. > > The error you are getting is due to a missing dependency (tokenauthz) you can > find on the arda www area: When I still was at CERN working for ALICE, I had > set up this page for alice downloads of xrootd (we had a separate autotools > build, before most of this went into the xrootd CVS) > > http://project-arda-dev.web.cern.ch/project-arda-dev/xrootd/tarballs/ > > I don't know which version Andreas is currently using, but he is be the best > source for how to operate the XrdTokenAuthz, because he implemented most of > it and only AliEn is currently enabled for this method. I cannot test here, > because I don't have an AliEn setup. > > Cheers, > Derek > > > > On Friday 03 February 2006 16.17, Artem Trunov wrote: > > Hi, Derek! > > > > Thanks for all explanations! I am now trying to actually setup servers > > for Alice. > > > > Since this libTokenAuthzOfs library is replacing libXrdOfs in the > > xrd.fslib directive , is it compatible with original? > > > > I tried to compile xrootd (20060105-0311) with token support, but got the > > following: > > > > XrdTokenAuthzOfs.cc:8:25: TTokenAuthz.h: No such file or directory > > XrdTokenAuthzOfs.cc: In member function `virtual int > > XrdTokenAuthzOfsFile::open(const char*, int, unsigned int, const > > XrdSecEntity*, const char*)': > > XrdTokenAuthzOfs.cc:71: `TAuthzXMLreader' undeclared (first use this > > function) > > > > ..etc... > > > > For my very first tests, I can probably use production alien installation > > at our site with it's token library, but I do need to be able to compile > > xrootd with it for normal production installations... > > > > Is this just packaging problems? Or there dependencies on ROOT? > > > > Artem. > > > > On Thu, 2 Feb 2006, Derek Feichtinger wrote: > > > Hi, Artem > > > > > > On Thursday 02 February 2006 11.10, Artem Trunov wrote: > > > > Hi, Derek! > > > > > > > > Thanks for detailed explanations! I now see that we indeed can't get > > > > away with generic setup of xrootd clusters, and will have to run > > > > AliEn-enabled version. It's not a big problem by itself, buth there is > > > > a complication - we have to maintain authorization database on every > > > > leaf node - not a nice thing... > > > > > > No, I was too unclear in my previous mail. > > > The leaf nodes are completely generic. They all contain the same little > > > policy file where keys per VO are defined and maybe some special rules, > > > if required (you can slice of part of the namespace for a certain VO, > > > etc). The authorization decision is taken by the catalog. The token you > > > get contains everything that the xrootd needs to determine the access > > > rights. The method just guarantees that the catalog's decision is safely > > > forwarded to the xrootd. > > > > > > Conceptually, the catalog is the owner of all files in this method > > > (however, we provided a possibility in the policy file, where local site > > > policy can be enforced, since this is a requirement from some sites). > > > > > > > If I understad you correctly, you prefere to avoid authorization on the > > > > master, and push it to leaf nodes? What do you think about reverse > > > > solution - authorization only on the master? This way the master is > > > > also you authorization server, and leaf nodes are generic... > > > > > > We want to avoid authentication on the redirector, because it is slow > > > (and as a consequence, I cannot do full authorization, because this > > > depends on prior authentication). The redirector should work in a way > > > that it can redirect clients as fast as possible, leaving the grunt work > > > to the leafs. > > > > > > For your approach, you would need to modify the xrootd protocol in a way > > > that the redirector informs the leaf that your access is allowed, because > > > your client is not proxied through the redirector to the leafs, but > > > really makes an own connection to the leaf node: If you know the name of > > > the file and on which leaf it resides, you can just go there directly > > > without ever contacting the redirector. So, in the present system you > > > need authen and authz on the leafs. > > > I think this is ok, because the additional effort is then optimally > > > distributed over the servers and you don't have a bottleneck in a > > > centrally important machine. > > > > > > Cheers, > > > Derek > > > > > > > Artem. > > > > > > > > On Thu, 2 Feb 2006, Derek Feichtinger wrote: > > > > > Hello, Artem > > > > > > > > > > > > we would be forced to run it on both redirectors and leaf nodes > > > > > > > (awful). > > > > > > > > > > > > Could you please explain a bit more, since this contradicts to > > > > > > Andy's answer. I.e. what will happen if Alien client carrying authz > > > > > > token comes to a server w/o AliEn authz lib? > > > > > > > > > > Ok. In our current design, the client asks the xrootd for the LFN. > > > > > The PFN is contained in the encrypted token from the catalog together > > > > > with the permission information and the requester's certificate > > > > > subject (the token can contain entries for multiple files). But the > > > > > redirector needs to know the PFN in order to perform its duty, so it > > > > > has to decrypt the token. > > > > > > > > > > xrootd gets the request as a normal URL: > > > > > root://server/LFN?authz=encrypted-token&vo=VO-name > > > > > > > > > > This was done, so that even the names of the physical files are > > > > > hidden from outside (and we wanted to have this in mainly to show > > > > > what possibilities the method offers, also for the paper we presented > > > > > at SC05). However, this forces us to decode the token already on the > > > > > redirector. > > > > > We could drop this hiding of the PFN, or we could think of a setup > > > > > where we still perform the token decryption on the redirector, but > > > > > without doing any authentication there. Authentication will then be > > > > > done on the leaf node together with another token decryption. The > > > > > token decryption is pretty fast (<10 ms). > > > > > I think this would be a good solution. > > > > > > > > > > The whole mechanism has the advantage that it can be easily > > > > > implemented for every catalog and that a single server can also > > > > > easily work securely for a number of different VOs (the catalog and > > > > > the storage elements just need to know each others public keys. > > > > > That's the central part of the encryption) Here is a link to the SC05 > > > > > paper, if you are interested: > > > > > > > > > > Paper: http://people.web.psi.ch/feichtinger/doc/authz.pdf > > > > > > > > > > (slides, somewhat flashy and ppt format): > > > > > http://people.web.psi.ch/feichtinger/doc/Grid05_dfeich.ppt > > > > > > > > > > > > > > > Cheers, > > > > > Derek >