Print

Print


That would be very promising. Is this something already available in the 
current R5 rc?

Diego

Il 3/5/2020 9:01 AM, Andrew Hanushevsky ha scritto:
> Hi Diego,
>
> Please be aware that in R5 we will have the capability to recreate the 
> original credentials between a proxy server and the origin server as 
> long as the proxy and origin use "sss" authentication between them. We 
> already do this for FUSE. This is quite workable in a local site (the 
> main use case for EOS). So, perhaps, this will be sufficient for what 
> ou want to do.
>
> Andy
>
>
> On Thu, 5 Mar 2020, Diego Ciangottini wrote:
>
>> Hi Andy, Michal,
>>
>> thank you. Indeed the main objective was to understand if this was an 
>> option to be investigated. It's pretty clear that is not the case, 
>> but I would say that this is not a showstopper. We do have some 
>> backup plans to evaluate now, if you are interested I can eventually 
>> report the results of these setups.
>>
>> Cheers,
>> Diego
>>
>> Il 3/4/2020 6:55 PM, Andrew Hanushevsky ha scritto:
>>> Ah, please be aware that the proxy server does not support 
>>> delegation. So, it would seema nother approach needs to be considered.
>>>
>>> Andy
>>>
>>> On Wed, 4 Mar 2020, Diego Ciangottini wrote:
>>>
>>>> Hi Michal,
>>>>
>>>> thanks for the clarification.
>>>> The use case that we are evaluating is a multi-group scernario 
>>>> where it is possible to share the access to the same cache daemon. 
>>>> Different namespace mappings are then managed by VOMS groups both 
>>>> on the cache and on origin server.
>>>>
>>>> I'm aware of the motivation/discussion for which this has been 
>>>> disabled,
>>>> but let's say that in some controlled scenarios, as the one we are 
>>>> investigating,
>>>> having the possibility of enabling it explicitly could be very useful.
>>>>
>>>> Diego
>>>>
>>>> Il 3/4/2020 4:08 PM, Michal Kamil Simon ha scritto:
>>>>> Hi Diego,
>>>>>
>>>>> Since 4.9.0 xrdcp will allow delegation only if it has been 
>>>>> requested explicitly, e.g.
>>>>>
>>>>>   xrdcp --tpc delegate only  ....
>>>>>
>>>>> (it will also reset XrdSecGSIDELEGPROXY)
>>>>>
>>>>> Currently, the only way to request delegation is when doing a 
>>>>> third-party-copy.
>>>>> So yes, one could say it's disabled on purpose. If you have a 
>>>>> valid use-case and
>>>>> a strong desire I could life the XrdSecGSIDELEGPROXY untouched in 
>>>>> case of
>>>>> classical copy jobs.
>>>>>
>>>>> Cheers,
>>>>> Michal
>>>>> ------------------------------------------------------------------------ 
>>>>> *From:* [log in to unmask] [[log in to unmask]] on 
>>>>> behalf of Diego Ciangottini [[log in to unmask]]
>>>>> *Sent:* 04 March 2020 14:35
>>>>> *To:* [log in to unmask]
>>>>> *Subject:* XrdSecGSIDELEGPROXY ignored by xrdcp
>>>>>
>>>>> Hello everyone,
>>>>>
>>>>> I'm playing a bit with several authN/Z combination for XCache and 
>>>>> I'm facing a problem when trying to use user proxy delegation.
>>>>>
>>>>> Even though I know that this is a "controversial" feature, it 
>>>>> might be useful in some special cases. So, the problem is the 
>>>>> following:
>>>>>
>>>>> - the cache server is v4.11.2 and configured with (*)
>>>>>
>>>>> - I'm then trying the following command with xrdcp v4.11.2:
>>>>>
>>>>> XrdSecGSIDELEGPROXY=2 XrdSecDEBUG=1 xrdcp -f 
>>>>> root://131.154.96.135:31094//test/test.txt /dev/null
>>>>>
>>>>> - one thing that already sounds strange is the output (**) where I 
>>>>> see:
>>>>>
>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *Proxy delegation option: 0*
>>>>>
>>>>> - and on server side accordingly:
>>>>>
>>>>> 200304 13:02:50 28389 secgsi_ErrF: Secgsi: ErrParseBuffer: error 
>>>>> getting user proxies: kXGS_init
>>>>>
>>>>> Am I missing something or it's indeed a problem client side? Is 
>>>>> it  even supposed to work or is it disabled on purpose?
>>>>>
>>>>> Cheers,
>>>>> Diego
>>>>>
>>>>>
>>>>> (*)
>>>>> all.export / stage
>>>>> oss.localroot /data/
>>>>>
>>>>> xrootd.trace debug
>>>>> xrd.trace debug
>>>>> sec.trace debug
>>>>>
>>>>> xrd.port 31094
>>>>>
>>>>> xrootd.seclib /usr/lib64/libXrdSec.so
>>>>> sec.protocol /usr/lib64 gsi \
>>>>>   -dlgpxy:1 -authzpxy:1 -exppxy:/tmp/x509up_g<group> \
>>>>>   -certdir:/etc/grid-security/certificates \
>>>>> -cert:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.crt \
>>>>> -key:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.key \
>>>>>   -d:3 \
>>>>>   -ca:1 -crl:0 \
>>>>>   -gridmap:/dev/null  \
>>>>>   -vomsfun:/usr/lib64/libXrdSecgsiVOMS.so 
>>>>> -vomsfunparms:certfmt=raw|dbg
>>>>>
>>>>> ofs.authorize 1
>>>>>
>>>>> acc.audit deny
>>>>> acc.authdb /etc/xrootd/Authfile-auth-X509-vo
>>>>> sec.protbind * gsi
>>>>>
>>>>>
>>>>> ofs.osslib   libXrdPss.so
>>>>> pss.cachelib libXrdFileCache.so
>>>>>
>>>>> pss.origin 193.204.89.93:1094
>>>>>
>>>>> pfc.diskusage 0.95 0.99
>>>>> pfc.ram     8G
>>>>>
>>>>> pfc.blocksize  512k
>>>>> pfc.prefetch   0
>>>>>
>>>>> (**)
>>>>> sec_Client: protocol request for host 131.154.96.135 
>>>>> token='&P=gsi,v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0'
>>>>> sec_PM: Loaded gsi protocol object from libXrdSecgsi.so
>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *** 
>>>>> ------------------------------------------------------------ ***
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Mode: client
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Debug: 1
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CA dir: 
>>>>> /afs/cern.ch/user/d/dciangot/CA
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CA verification level: 1
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL dir: 
>>>>> ,/afs/cern.ch/user/d/dciangot/CA/
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL extension: .r0
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL check level: 1
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  CRL refresh time: 86400
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Certificate: 
>>>>> /afs/cern.ch/user/d/dciangot/.globus/usercert.pem
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Key: 
>>>>> /afs/cern.ch/user/d/dciangot/.globus/userkey.pem
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy file: 
>>>>> /tmp/x509up_u34086
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy validity: 12:00
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy dep length: 0
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy bits: 512
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy sign option: 1
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Proxy delegation option: 0
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Allowed server names: 
>>>>> [*/]<target host name>[/*]
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Crypto modules: ssl
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Ciphers: 
>>>>> aes-128-cbc:bf-cbc:des-ede3-cbc
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  MDigests: sha1:md5
>>>>> 200304 14:02:50 16321 secgsi_InitOpts:  Trusting DNS for hostname 
>>>>> checking
>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *** 
>>>>> ------------------------------------------------------------ ***
>>>>> sec_PM: Using gsi protocol, 
>>>>> args='v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0'
>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 3 
>>>>> extensions
>>>>> 200304 14:02:50 16321 secgsi_GetCA: CRL is missing or expired: 
>>>>> ignoring (CRLCheck: 1)
>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 3 
>>>>> extensions
>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 9 
>>>>> extensions
>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has 4 
>>>>> extensions
>>>>> [0B/0B][100%][==================================================][0B/s] 
>>>>>
>>>>> Run: [ERROR] Server responded with an error: [3010] Unable to open 
>>>>> /test/test.txt; permission denied
>>>>>
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------ 
>>>>>
>>>>> Use REPLY-ALL to reply to list
>>>>>
>>>>> To unsubscribe from the XROOTD-L list, click the following link:
>>>>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1
>>>>>
>>>>
>>>> ######################################################################## 
>>>>
>>>> Use REPLY-ALL to reply to list
>>>>
>>>> To unsubscribe from the XROOTD-L list, click the following link:
>>>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1
>>>>
>>

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-L list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1