Print

Print


Hi Diego,

Not yet. It's a bit of work to make this change fully backward compatible. 
However, I hope to have it in there in a couple of weeks. Sounds like you 
are willing to test it!

Andy

On Thu, 5 Mar 2020, Diego Ciangottini wrote:

> That would be very promising. Is this something already available in the 
> current R5 rc?
>
> Diego
>
> Il 3/5/2020 9:01 AM, Andrew Hanushevsky ha scritto:
>> Hi Diego,
>> 
>> Please be aware that in R5 we will have the capability to recreate the 
>> original credentials between a proxy server and the origin server as long 
>> as the proxy and origin use "sss" authentication between them. We already 
>> do this for FUSE. This is quite workable in a local site (the main use case 
>> for EOS). So, perhaps, this will be sufficient for what ou want to do.
>> 
>> Andy
>> 
>> 
>> On Thu, 5 Mar 2020, Diego Ciangottini wrote:
>> 
>>> Hi Andy, Michal,
>>> 
>>> thank you. Indeed the main objective was to understand if this was an 
>>> option to be investigated. It's pretty clear that is not the case, but I 
>>> would say that this is not a showstopper. We do have some backup plans to 
>>> evaluate now, if you are interested I can eventually report the results of 
>>> these setups.
>>> 
>>> Cheers,
>>> Diego
>>> 
>>> Il 3/4/2020 6:55 PM, Andrew Hanushevsky ha scritto:
>>>> Ah, please be aware that the proxy server does not support delegation. 
>>>> So, it would seema nother approach needs to be considered.
>>>> 
>>>> Andy
>>>> 
>>>> On Wed, 4 Mar 2020, Diego Ciangottini wrote:
>>>> 
>>>>> Hi Michal,
>>>>> 
>>>>> thanks for the clarification.
>>>>> The use case that we are evaluating is a multi-group scernario where it 
>>>>> is possible to share the access to the same cache daemon. Different 
>>>>> namespace mappings are then managed by VOMS groups both on the cache and 
>>>>> on origin server.
>>>>> 
>>>>> I'm aware of the motivation/discussion for which this has been disabled,
>>>>> but let's say that in some controlled scenarios, as the one we are 
>>>>> investigating,
>>>>> having the possibility of enabling it explicitly could be very useful.
>>>>> 
>>>>> Diego
>>>>> 
>>>>> Il 3/4/2020 4:08 PM, Michal Kamil Simon ha scritto:
>>>>>> Hi Diego,
>>>>>> 
>>>>>> Since 4.9.0 xrdcp will allow delegation only if it has been requested 
>>>>>> explicitly, e.g.
>>>>>> 
>>>>>>   xrdcp --tpc delegate only  ....
>>>>>> 
>>>>>> (it will also reset XrdSecGSIDELEGPROXY)
>>>>>> 
>>>>>> Currently, the only way to request delegation is when doing a 
>>>>>> third-party-copy.
>>>>>> So yes, one could say it's disabled on purpose. If you have a valid 
>>>>>> use-case and
>>>>>> a strong desire I could life the XrdSecGSIDELEGPROXY untouched in case 
>>>>>> of
>>>>>> classical copy jobs.
>>>>>> 
>>>>>> Cheers,
>>>>>> Michal
>>>>>> 
>>>>>> ------------------------------------------------------------------------ 
>>>>>> *From:* [log in to unmask] [[log in to unmask]] on 
>>>>>> behalf of Diego Ciangottini [[log in to unmask]]
>>>>>> *Sent:* 04 March 2020 14:35
>>>>>> *To:* [log in to unmask]
>>>>>> *Subject:* XrdSecGSIDELEGPROXY ignored by xrdcp
>>>>>> 
>>>>>> Hello everyone,
>>>>>> 
>>>>>> I'm playing a bit with several authN/Z combination for XCache and I'm 
>>>>>> facing a problem when trying to use user proxy delegation.
>>>>>> 
>>>>>> Even though I know that this is a "controversial" feature, it might be 
>>>>>> useful in some special cases. So, the problem is the following:
>>>>>> 
>>>>>> - the cache server is v4.11.2 and configured with (*)
>>>>>> 
>>>>>> - I'm then trying the following command with xrdcp v4.11.2:
>>>>>> 
>>>>>> XrdSecGSIDELEGPROXY=2 XrdSecDEBUG=1 xrdcp -f 
>>>>>> root://131.154.96.135:31094//test/test.txt /dev/null
>>>>>> 
>>>>>> - one thing that already sounds strange is the output (**) where I see:
>>>>>> 
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *Proxy delegation option: 0*
>>>>>> 
>>>>>> - and on server side accordingly:
>>>>>> 
>>>>>> 200304 13:02:50 28389 secgsi_ErrF: Secgsi: ErrParseBuffer: error 
>>>>>> getting user proxies: kXGS_init
>>>>>> 
>>>>>> Am I missing something or it's indeed a problem client side? Is it  
>>>>>> even supposed to work or is it disabled on purpose?
>>>>>> 
>>>>>> Cheers,
>>>>>> Diego
>>>>>> 
>>>>>> 
>>>>>> (*)
>>>>>> all.export / stage
>>>>>> oss.localroot /data/
>>>>>> 
>>>>>> xrootd.trace debug
>>>>>> xrd.trace debug
>>>>>> sec.trace debug
>>>>>> 
>>>>>> xrd.port 31094
>>>>>> 
>>>>>> xrootd.seclib /usr/lib64/libXrdSec.so
>>>>>> sec.protocol /usr/lib64 gsi \
>>>>>>   -dlgpxy:1 -authzpxy:1 -exppxy:/tmp/x509up_g<group> \
>>>>>>   -certdir:/etc/grid-security/certificates \
>>>>>> -cert:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.crt \
>>>>>> -key:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.key \
>>>>>>   -d:3 \
>>>>>>   -ca:1 -crl:0 \
>>>>>>   -gridmap:/dev/null  \
>>>>>>   -vomsfun:/usr/lib64/libXrdSecgsiVOMS.so -vomsfunparms:certfmt=raw|dbg
>>>>>> 
>>>>>> ofs.authorize 1
>>>>>> 
>>>>>> acc.audit deny
>>>>>> acc.authdb /etc/xrootd/Authfile-auth-X509-vo
>>>>>> sec.protbind * gsi
>>>>>> 
>>>>>> 
>>>>>> ofs.osslib   libXrdPss.so
>>>>>> pss.cachelib libXrdFileCache.so
>>>>>> 
>>>>>> pss.origin 193.204.89.93:1094
>>>>>> 
>>>>>> pfc.diskusage 0.95 0.99
>>>>>> pfc.ram     8G
>>>>>> 
>>>>>> pfc.blocksize  512k
>>>>>> pfc.prefetch   0
>>>>>> 
>>>>>> (**)
>>>>>> sec_Client: protocol request for host 131.154.96.135 
>>>>>> token='&P=gsi,v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0'
>>>>>> sec_PM: Loaded gsi protocol object from libXrdSecgsi.so
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *** 
>>>>>> ------------------------------------------------------------ ***
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Mode: client
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Debug: 1
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CA dir: 
>>>>>> /afs/cern.ch/user/d/dciangot/CA
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CA verification level: 1
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL dir: 
>>>>>> ,/afs/cern.ch/user/d/dciangot/CA/
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL extension: .r0
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL check level: 1
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL refresh time: 86400
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Certificate: 
>>>>>> /afs/cern.ch/user/d/dciangot/.globus/usercert.pem
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Key: 
>>>>>> /afs/cern.ch/user/d/dciangot/.globus/userkey.pem
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy file: /tmp/x509up_u34086
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy validity: 12:00
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy dep length: 0
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy bits: 512
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy sign option: 1
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy delegation option: 0
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Allowed server names: 
>>>>>> [*/]<target host name>[/*]
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Crypto modules: ssl
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Ciphers: 
>>>>>> aes-128-cbc:bf-cbc:des-ede3-cbc
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  MDigests: sha1:md5
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Trusting DNS for hostname 
>>>>>> checking
>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *** 
>>>>>> ------------------------------------------------------------ ***
>>>>>> sec_PM: Using gsi protocol, 
>>>>>> args='v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0'
>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 3 
>>>>>> extensions
>>>>>> 200304 14:02:50 16321 secgsi_GetCA: CRL is missing or expired: ignoring 
>>>>>> (CRLCheck: 1)
>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 3 
>>>>>> extensions
>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 9 
>>>>>> extensions
>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 4 
>>>>>> extensions
>>>>>> [0B/0B][100%][==================================================][0B/s] 
>>>>>> Run: [ERROR] Server responded with an error: [3010] Unable to open 
>>>>>> /test/test.txt; permission denied
>>>>>> 
>>>>>> 
>>>>>>
>>>>>> 
>>>>>> ------------------------------------------------------------------------ 
>>>>>> Use REPLY-ALL to reply to list
>>>>>> 
>>>>>> To unsubscribe from the XROOTD-L list, click the following link:
>>>>>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1
>>>>>> 
>>>>> 
>>>>> ######################################################################## 
>>>>> Use REPLY-ALL to reply to list
>>>>> 
>>>>> To unsubscribe from the XROOTD-L list, click the following link:
>>>>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1
>>>>> 
>>> 
>

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-L list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1