Print

Print


Ah, please be aware that the proxy server does not support delegation. So, 
it would seema nother approach needs to be considered.

Andy

On Wed, 4 Mar 2020, Diego Ciangottini wrote:

> Hi Michal,
>
> thanks for the clarification.
> The use case that we are evaluating is a multi-group scernario where it is 
> possible to share the access to the same cache daemon. Different namespace 
> mappings are then managed by VOMS groups both on the cache and on origin 
> server.
>
> I'm aware of the motivation/discussion for which this has been disabled,
> but let's say that in some controlled scenarios, as the one we are 
> investigating,
> having the possibility of enabling it explicitly could be very useful.
>
> Diego
>
> Il 3/4/2020 4:08 PM, Michal Kamil Simon ha scritto:
>> Hi Diego,
>> 
>> Since 4.9.0 xrdcp will allow delegation only if it has been requested 
>> explicitly, e.g.
>> 
>>   xrdcp --tpc delegate only  ....
>> 
>> (it will also reset XrdSecGSIDELEGPROXY)
>> 
>> Currently, the only way to request delegation is when doing a 
>> third-party-copy.
>> So yes, one could say it's disabled on purpose. If you have a valid 
>> use-case and
>> a strong desire I could life the XrdSecGSIDELEGPROXY untouched in case of
>> classical copy jobs.
>> 
>> Cheers,
>> Michal
>> ------------------------------------------------------------------------
>> *From:* [log in to unmask] [[log in to unmask]] on behalf 
>> of Diego Ciangottini [[log in to unmask]]
>> *Sent:* 04 March 2020 14:35
>> *To:* [log in to unmask]
>> *Subject:* XrdSecGSIDELEGPROXY ignored by xrdcp
>> 
>> Hello everyone,
>> 
>> I'm playing a bit with several authN/Z combination for XCache and I'm 
>> facing a problem when trying to use user proxy delegation.
>> 
>> Even though I know that this is a "controversial" feature, it might be 
>> useful in some special cases. So, the problem is the following:
>> 
>> - the cache server is v4.11.2 and configured with (*)
>> 
>> - I'm then trying the following command with xrdcp v4.11.2:
>> 
>> XrdSecGSIDELEGPROXY=2 XrdSecDEBUG=1 xrdcp -f 
>> root://131.154.96.135:31094//test/test.txt /dev/null
>> 
>> - one thing that already sounds strange is the output (**) where I see:
>> 
>> 200304 14:02:50 16321 secgsi_InitOpts: *Proxy delegation option: 0*
>> 
>> - and on server side accordingly:
>> 
>> 200304 13:02:50 28389 secgsi_ErrF: Secgsi: ErrParseBuffer: error getting 
>> user proxies: kXGS_init
>> 
>> Am I missing something or it's indeed a problem client side? Is it  even 
>> supposed to work or is it disabled on purpose?
>> 
>> Cheers,
>> Diego
>> 
>> 
>> (*)
>> all.export / stage
>> oss.localroot /data/
>> 
>> xrootd.trace debug
>> xrd.trace debug
>> sec.trace debug
>> 
>> xrd.port 31094
>> 
>> xrootd.seclib /usr/lib64/libXrdSec.so
>> sec.protocol /usr/lib64 gsi \
>>   -dlgpxy:1 -authzpxy:1 -exppxy:/tmp/x509up_g<group> \
>>   -certdir:/etc/grid-security/certificates \
>> -cert:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.crt \
>> -key:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.key \
>>   -d:3 \
>>   -ca:1 -crl:0 \
>>   -gridmap:/dev/null  \
>>   -vomsfun:/usr/lib64/libXrdSecgsiVOMS.so -vomsfunparms:certfmt=raw|dbg
>> 
>> ofs.authorize 1
>> 
>> acc.audit deny
>> acc.authdb /etc/xrootd/Authfile-auth-X509-vo
>> sec.protbind * gsi
>> 
>> 
>> ofs.osslib   libXrdPss.so
>> pss.cachelib libXrdFileCache.so
>> 
>> pss.origin 193.204.89.93:1094
>> 
>> pfc.diskusage 0.95 0.99
>> pfc.ram     8G
>> 
>> pfc.blocksize  512k
>> pfc.prefetch   0
>> 
>> (**)
>> sec_Client: protocol request for host 131.154.96.135 
>> token='&P=gsi,v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0'
>> sec_PM: Loaded gsi protocol object from libXrdSecgsi.so
>> 200304 14:02:50 16321 secgsi_InitOpts: *** 
>> ------------------------------------------------------------ ***
>> 200304 14:02:50 16321 secgsi_InitOpts:  Mode: client
>> 200304 14:02:50 16321 secgsi_InitOpts:  Debug: 1
>> 200304 14:02:50 16321 secgsi_InitOpts:  CA dir: 
>> /afs/cern.ch/user/d/dciangot/CA
>> 200304 14:02:50 16321 secgsi_InitOpts:  CA verification level: 1
>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL dir: 
>> ,/afs/cern.ch/user/d/dciangot/CA/
>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL extension: .r0
>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL check level: 1
>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL refresh time: 86400
>> 200304 14:02:50 16321 secgsi_InitOpts:  Certificate: 
>> /afs/cern.ch/user/d/dciangot/.globus/usercert.pem
>> 200304 14:02:50 16321 secgsi_InitOpts:  Key: 
>> /afs/cern.ch/user/d/dciangot/.globus/userkey.pem
>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy file: /tmp/x509up_u34086
>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy validity: 12:00
>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy dep length: 0
>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy bits: 512
>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy sign option: 1
>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy delegation option: 0
>> 200304 14:02:50 16321 secgsi_InitOpts:  Allowed server names: [*/]<target 
>> host name>[/*]
>> 200304 14:02:50 16321 secgsi_InitOpts:  Crypto modules: ssl
>> 200304 14:02:50 16321 secgsi_InitOpts:  Ciphers: 
>> aes-128-cbc:bf-cbc:des-ede3-cbc
>> 200304 14:02:50 16321 secgsi_InitOpts:  MDigests: sha1:md5
>> 200304 14:02:50 16321 secgsi_InitOpts:  Trusting DNS for hostname checking
>> 200304 14:02:50 16321 secgsi_InitOpts: *** 
>> ------------------------------------------------------------ ***
>> sec_PM: Using gsi protocol, args='v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0'
>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 3 
>> extensions
>> 200304 14:02:50 16321 secgsi_GetCA: CRL is missing or expired: ignoring 
>> (CRLCheck: 1)
>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 3 
>> extensions
>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 9 
>> extensions
>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 4 
>> extensions
>> [0B/0B][100%][==================================================][0B/s]
>> Run: [ERROR] Server responded with an error: [3010] Unable to open 
>> /test/test.txt; permission denied
>> 
>> 
>> 
>> ------------------------------------------------------------------------
>> 
>> Use REPLY-ALL to reply to list
>> 
>> To unsubscribe from the XROOTD-L list, click the following link:
>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1
>> 
>
> ########################################################################
> Use REPLY-ALL to reply to list
>
> To unsubscribe from the XROOTD-L list, click the following link:
> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1
>

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-L list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1