Sure, I'd like test it. I'll keep an eye on release communication, but, in case I'd miss it, please feel free to contact me! Thanks, Diego Il 3/5/2020 10:50 PM, Andrew Hanushevsky ha scritto: > Hi Diego, > > Not yet. It's a bit of work to make this change fully backward > compatible. However, I hope to have it in there in a couple of weeks. > Sounds like you are willing to test it! > > Andy > > On Thu, 5 Mar 2020, Diego Ciangottini wrote: > >> That would be very promising. Is this something already available in >> the current R5 rc? >> >> Diego >> >> Il 3/5/2020 9:01 AM, Andrew Hanushevsky ha scritto: >>> Hi Diego, >>> >>> Please be aware that in R5 we will have the capability to recreate >>> the original credentials between a proxy server and the origin >>> server as long as the proxy and origin use "sss" authentication >>> between them. We already do this for FUSE. This is quite workable in >>> a local site (the main use case for EOS). So, perhaps, this will be >>> sufficient for what ou want to do. >>> >>> Andy >>> >>> >>> On Thu, 5 Mar 2020, Diego Ciangottini wrote: >>> >>>> Hi Andy, Michal, >>>> >>>> thank you. Indeed the main objective was to understand if this was >>>> an option to be investigated. It's pretty clear that is not the >>>> case, but I would say that this is not a showstopper. We do have >>>> some backup plans to evaluate now, if you are interested I can >>>> eventually report the results of these setups. >>>> >>>> Cheers, >>>> Diego >>>> >>>> Il 3/4/2020 6:55 PM, Andrew Hanushevsky ha scritto: >>>>> Ah, please be aware that the proxy server does not support >>>>> delegation. So, it would seema nother approach needs to be >>>>> considered. >>>>> >>>>> Andy >>>>> >>>>> On Wed, 4 Mar 2020, Diego Ciangottini wrote: >>>>> >>>>>> Hi Michal, >>>>>> >>>>>> thanks for the clarification. >>>>>> The use case that we are evaluating is a multi-group scernario >>>>>> where it is possible to share the access to the same cache >>>>>> daemon. Different namespace mappings are then managed by VOMS >>>>>> groups both on the cache and on origin server. >>>>>> >>>>>> I'm aware of the motivation/discussion for which this has been >>>>>> disabled, >>>>>> but let's say that in some controlled scenarios, as the one we >>>>>> are investigating, >>>>>> having the possibility of enabling it explicitly could be very >>>>>> useful. >>>>>> >>>>>> Diego >>>>>> >>>>>> Il 3/4/2020 4:08 PM, Michal Kamil Simon ha scritto: >>>>>>> Hi Diego, >>>>>>> >>>>>>> Since 4.9.0 xrdcp will allow delegation only if it has been >>>>>>> requested explicitly, e.g. >>>>>>> >>>>>>> xrdcp --tpc delegate only .... >>>>>>> >>>>>>> (it will also reset XrdSecGSIDELEGPROXY) >>>>>>> >>>>>>> Currently, the only way to request delegation is when doing a >>>>>>> third-party-copy. >>>>>>> So yes, one could say it's disabled on purpose. If you have a >>>>>>> valid use-case and >>>>>>> a strong desire I could life the XrdSecGSIDELEGPROXY untouched >>>>>>> in case of >>>>>>> classical copy jobs. >>>>>>> >>>>>>> Cheers, >>>>>>> Michal >>>>>>> >>>>>>> ------------------------------------------------------------------------ >>>>>>> *From:* [log in to unmask] [[log in to unmask]] >>>>>>> on behalf of Diego Ciangottini [[log in to unmask]] >>>>>>> *Sent:* 04 March 2020 14:35 >>>>>>> *To:* [log in to unmask] >>>>>>> *Subject:* XrdSecGSIDELEGPROXY ignored by xrdcp >>>>>>> >>>>>>> Hello everyone, >>>>>>> >>>>>>> I'm playing a bit with several authN/Z combination for XCache >>>>>>> and I'm facing a problem when trying to use user proxy delegation. >>>>>>> >>>>>>> Even though I know that this is a "controversial" feature, it >>>>>>> might be useful in some special cases. So, the problem is the >>>>>>> following: >>>>>>> >>>>>>> - the cache server is v4.11.2 and configured with (*) >>>>>>> >>>>>>> - I'm then trying the following command with xrdcp v4.11.2: >>>>>>> >>>>>>> XrdSecGSIDELEGPROXY=2 XrdSecDEBUG=1 xrdcp -f >>>>>>> root://131.154.96.135:31094//test/test.txt /dev/null >>>>>>> >>>>>>> - one thing that already sounds strange is the output (**) where >>>>>>> I see: >>>>>>> >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *Proxy delegation option: 0* >>>>>>> >>>>>>> - and on server side accordingly: >>>>>>> >>>>>>> 200304 13:02:50 28389 secgsi_ErrF: Secgsi: ErrParseBuffer: error >>>>>>> getting user proxies: kXGS_init >>>>>>> >>>>>>> Am I missing something or it's indeed a problem client side? Is >>>>>>> it even supposed to work or is it disabled on purpose? >>>>>>> >>>>>>> Cheers, >>>>>>> Diego >>>>>>> >>>>>>> >>>>>>> (*) >>>>>>> all.export / stage >>>>>>> oss.localroot /data/ >>>>>>> >>>>>>> xrootd.trace debug >>>>>>> xrd.trace debug >>>>>>> sec.trace debug >>>>>>> >>>>>>> xrd.port 31094 >>>>>>> >>>>>>> xrootd.seclib /usr/lib64/libXrdSec.so >>>>>>> sec.protocol /usr/lib64 gsi \ >>>>>>> -dlgpxy:1 -authzpxy:1 -exppxy:/tmp/x509up_g<group> \ >>>>>>> -certdir:/etc/grid-security/certificates \ >>>>>>> -cert:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.crt \ >>>>>>> -key:/etc/grid-security/xrd/cloud-vm135.cloud.cnaf.infn.it.key \ >>>>>>> -d:3 \ >>>>>>> -ca:1 -crl:0 \ >>>>>>> -gridmap:/dev/null \ >>>>>>> -vomsfun:/usr/lib64/libXrdSecgsiVOMS.so >>>>>>> -vomsfunparms:certfmt=raw|dbg >>>>>>> >>>>>>> ofs.authorize 1 >>>>>>> >>>>>>> acc.audit deny >>>>>>> acc.authdb /etc/xrootd/Authfile-auth-X509-vo >>>>>>> sec.protbind * gsi >>>>>>> >>>>>>> >>>>>>> ofs.osslib libXrdPss.so >>>>>>> pss.cachelib libXrdFileCache.so >>>>>>> >>>>>>> pss.origin 193.204.89.93:1094 >>>>>>> >>>>>>> pfc.diskusage 0.95 0.99 >>>>>>> pfc.ram 8G >>>>>>> >>>>>>> pfc.blocksize 512k >>>>>>> pfc.prefetch 0 >>>>>>> >>>>>>> (**) >>>>>>> sec_Client: protocol request for host 131.154.96.135 >>>>>>> token='&P=gsi,v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0' >>>>>>> sec_PM: Loaded gsi protocol object from libXrdSecgsi.so >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *** >>>>>>> ------------------------------------------------------------ *** >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Mode: client >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Debug: 1 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: CA dir: >>>>>>> /afs/cern.ch/user/d/dciangot/CA >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: CA verification level: 1 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: CRL dir: >>>>>>> ,/afs/cern.ch/user/d/dciangot/CA/ >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: CRL extension: .r0 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: CRL check level: 1 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: CRL refresh time: 86400 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Certificate: >>>>>>> /afs/cern.ch/user/d/dciangot/.globus/usercert.pem >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Key: >>>>>>> /afs/cern.ch/user/d/dciangot/.globus/userkey.pem >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Proxy file: >>>>>>> /tmp/x509up_u34086 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Proxy validity: 12:00 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Proxy dep length: 0 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Proxy bits: 512 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Proxy sign option: 1 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Proxy delegation option: 0 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Allowed server names: >>>>>>> [*/]<target host name>[/*] >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Crypto modules: ssl >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Ciphers: >>>>>>> aes-128-cbc:bf-cbc:des-ede3-cbc >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: MDigests: sha1:md5 >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: Trusting DNS for >>>>>>> hostname checking >>>>>>> 200304 14:02:50 16321 secgsi_InitOpts: *** >>>>>>> ------------------------------------------------------------ *** >>>>>>> sec_PM: Using gsi protocol, >>>>>>> args='v:10400,c:ssl,ca:eec62e9c.0|bf6400bf.0' >>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has >>>>>>> 3 extensions >>>>>>> 200304 14:02:50 16321 secgsi_GetCA: CRL is missing or expired: >>>>>>> ignoring (CRLCheck: 1) >>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has >>>>>>> 3 extensions >>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has >>>>>>> 9 extensions >>>>>>> 200304 14:02:50 16321 cryptossl_X509::CertType: certificate has >>>>>>> 4 extensions >>>>>>> [0B/0B][100%][==================================================][0B/s] >>>>>>> Run: [ERROR] Server responded with an error: [3010] Unable to >>>>>>> open /test/test.txt; permission denied >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> ------------------------------------------------------------------------ >>>>>>> Use REPLY-ALL to reply to list >>>>>>> >>>>>>> To unsubscribe from the XROOTD-L list, click the following link: >>>>>>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1 >>>>>>> >>>>>> >>>>>> ######################################################################## >>>>>> Use REPLY-ALL to reply to list >>>>>> >>>>>> To unsubscribe from the XROOTD-L list, click the following link: >>>>>> https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1 >>>>>> >>>> >> ######################################################################## Use REPLY-ALL to reply to list To unsubscribe from the XROOTD-L list, click the following link: https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1