That is correct, Matevz On Tue, Feb 15, 2022, 18:39 Matevz Tadel <[log in to unmask]> wrote: > Thank you Andy! > > The error is permanent, I think. Justas, can you please confirm? > > Matevz > > On 2/15/22 17:49, Andrew Hanushevsky wrote: > > Here are the common problems when the client issues that message: > > > > 1) The certificate's chain of trust is broken (could be because the root > CA > > can't be verified, or the root/intermediate certificate has expired). > This would > > cause sproradic failures (note that if the certificate is improperly > installed > > then the failure would always occur which is not the case here). > > > > 2) The certificate must be renewed before the expiry of the certificate > to avoid > > any conflict arising out of time violation. Ensure that the date/time is > set > > correctly on your computer since that might be used to assess the > validity > > period of the SSL certificate of the website. This would cause repated > failures > > on some sites but not others depending on how close the cert was to > expiring. > > > > 3) The certificate structure is broken, or the certificate's signature > can't be > > checked. This is the hardest to solve but one reason could me random > memory > > corruption. I would suggest runningthe client with valgrind and try to > match the > > valgring log with the invalid cert message. > > > > 4) Firewall issues may cause problems with they have been enabled for > > "encrypted/SSL scanning or checking." > > > > 5) If tghe server is using only SHA-1 encryption then those cert are > flagged as > > insecure and need to update their security certificates. However, would > most > > likely cause permanent errors. > > > > Andy > > > > > > > > On Tue, 15 Feb 2022, Matevz Tadel wrote: > > > >> Andy, > >> > >> What's with the invalid certificate in the client log? > >> > >> [2022-02-15 09:56:19.549139 -0800][Debug ][XRootDTransport ] > >> [transfer-9.ultralight.org:1095.0] Sending out kXR_login request, > username: > >> root, cgi: > >> ?xrd.cc=us&xrd.tz=-8&xrd.appname=xrdcp&xrd.info=&xrd.hostname= > xrd-cache-3.ultralight.org&xrd.rn=v5.2.0, > >> dual-stack: true, private IPv4: false, private IPv6: false > >> [2022-02-15 09:56:19.549209 -0800][Debug ][AsyncSock ] > >> [transfer-9.ultralight.org:1095.0] TLS hand-shake exchange. > >> > >> ===> HERE: > >> [2022-02-15 09:56:19.551762 -0800][Error ][TlsMsg ] > [TLS_Context:] > >> Unable to create TLS context; invalid certificate. > >> > >> [2022-02-15 09:56:19.551903 -0800][Error ][AsyncSock ] > >> [transfer-9.ultralight.org:1095.0] Socket error while handshaking: > [FATAL] TLS > >> error > >> [2022-02-15 09:56:19.551920 -0800][Debug ][AsyncSock ] > >> [transfer-9.ultralight.org:1095.0] Closing the socket > >> > >> Can I run in gdb to get more info? What is good place to start poking? > >> > >> I was assuming it's the server cert that client does not like ... but > it does > >> look ok to me :) > >> > >> Matevz > >> > >> > >> On 2/15/22 14:04, Andrew Hanushevsky wrote: > >>> Hi Bockjoo, > >>> > >>> Unfortunately, that's not the way it works. While gsi doesn't need to > use TLS > >>> ztn does. Since the erver doesn't know which protocol the client will > eventually > >>> settle on, the connection has to use TLS right from the start. That > means you > >>> cannot use ztn with incapable clients. > >>> > >>> Andy > >>> > >>> > >>> On Tue, 15 Feb 2022, Bockjoo Kim wrote: > >>> > >>>> Hi Andy, > >>>> > >>>> There are two sec.protocols: gsi and ztn. > >>>> > >>>> Doesn't the interaction go through gsi and if it fails, will it go > through ztn? > >>>> > >>>> For incapable clients, the gsi can succeed, no? > >>>> > >>>> Thanks, > >>>> > >>>> Bockjoo > >>>> > >>>> On 2/15/22 14:52, Andrew Hanushevsky wrote: > >>>>> Hi Justas, > >>>>> > >>>>> If you look into the log you will notice a warning that tells you > that TLS > >>>>> will always be on regardless of the "capable" setting because > authentication > >>>>> protocol ztn requires tls. So, this may be the source of the problem, > >>>>> certainly it will be for incapable clients. > >>>>> > >>>>> Andy > >>>>> > >>>>> > >>>>> On Tue, 15 Feb 2022, Justas Balcas wrote: > >>>>> > >>>>>> Hi, > >>>>>> > >>>>>> Server's/Clients are running > 5.3.X release (not 5.4). I took out > 1 server > >>>>>> from prod and played with full debug mode, on/off tls. > >>>>>> > >>>>>> Logs from server/client are available here: > >>>>>> > https://urldefense.proofpoint.com/v2/url?u=https-3A__login-2D1.hep.caltech.edu_-7Ejbalcas_tls_&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=tns3GlZokUnAN9f_4ZHOR1kQXE0DrfqOgDK3bos6dS4&e= > >>>>>> > >>>>>> > >>>>>> To turn TLS, I added this config: > >>>>>> xrd.tls /etc/grid-security/xrootd/xrootdcert.pem > >>>>>> /etc/grid-security/xrootd/xrootdkey.pem > >>>>>> xrd.tlsca certdir /etc/grid-security/certificates > >>>>>> xrootd.tls capable all > >>>>>> sec.protocol /usr/lib64 ztn > >>>>>> > >>>>>> And with TLS on - I always get: > >>>>>> TLS hand-shake exchange. > >>>>>> Socket error while handshaking: [FATAL] TLS error > >>>>>> Closing the socket > >>>>>> > >>>>>> > >>>>>> If it helps, here is full config: > >>>>>> > >>>>>> all.export /tmp stage > >>>>>> frm.xfr.copycmd /bin/cp /dev/null $PFN > >>>>>> all.adminpath /var/spool/xrootd > >>>>>> all.pidpath /var/run/xrootd > >>>>>> > >>>>>> # XrootD Security > >>>>>> # --------------------------------------- > >>>>>> xrootd.seclib /usr/lib64/libXrdSec.so > >>>>>> sec.protocol /usr/lib64 gsi -certdir:/etc/grid-security/certificates > >>>>>> -cert:/etc/grid-security/xrootd/xrootdcert.pem > >>>>>> -key:/etc/grid-security/xrootd/xrootdkey.pem -crl:3 > >>>>>> -authzfun:libXrdLcmaps.so -authzto:900 > >>>>>> -authzfunparms:lcmapscfg=/etc/xrootd/lcmaps.cfg -gmapopt:10 > -gmapto:0 > >>>>>> acc.authdb /etc/xrootd/auth_file_stageout > >>>>>> ofs.authorize > >>>>>> macaroons.secretkey /etc/xrootd/macaroon-secret > >>>>>> ofs.authlib ++ libXrdMacaroons.so > >>>>>> ofs.authlib ++ libXrdAccSciTokens.so > >>>>>> # -------------------------------------- > >>>>>> # XrootD Monitoring > >>>>>> # -------------------------------------- > >>>>>> # Monitoring for AAA Dashboard : > >>>>>> xrd.report 169.228.130.91:9931 every 30s all sync > >>>>>> xrootd.monitor all auth flush 30s window 5s fstat 60 lfn ops xfr 5 > dest > >>>>>> files io info user 169.228.130.91:9930 dest fstat info user > >>>>>> xrd-mon.osgstorage.org:9930 > >>>>>> all.sitename T2_US_Caltech > >>>>>> # ------------------------------------- > >>>>>> # Configure redirector/server > >>>>>> # ------------------------------------- > >>>>>> set xrdr = xrootd-redir-stageout.ultralight.org > >>>>>> xrd.port 1095 > >>>>>> all.manager $(xrdr):1213 > >>>>>> > >>>>>> if $(xrdr) > >>>>>> # It's role is manager > >>>>>> all.role manager > >>>>>> # Redirect all lookup calls to original data servers. Redirector > does not > >>>>>> have visibility of FS > >>>>>> cms.dfs lookup distrib mdhold 20m redirect immed > >>>>>> else > >>>>>> # Role is server > >>>>>> all.role server > >>>>>> # The known managers (local redirector) > >>>>>> all.manager meta $(xrdr):1213 > >>>>>> > >>>>>> # Enable xrootd checksum calculation "on-the-fly" using multiuser > plugin > >>>>>> # This makes XRootD to write the files with the > >>>>>> # ownership of the user that authenticated to the server and not > as the > >>>>>> # 'xrootd' user > >>>>>> ofs.osslib ++ libXrdMultiuser.so > >>>>>> # Enable the checksum wrapper > >>>>>> ofs.ckslib * libXrdMultiuser.so > >>>>>> # Control of checksum > >>>>>> xrootd.chksum max 10 adler32 > >>>>>> multiuser.checksumonwrite on > >>>>>> multiuser.umask 0002 > >>>>>> > >>>>>> fi > >>>>>> # ------------------------------------- > >>>>>> # Allow only specific path, checksum config > >>>>>> # ------------------------------------- > >>>>>> # Allow any path to be exported; this is further refined in the > authfile. > >>>>>> all.export / > >>>>>> > >>>>>> # Hosts allowed to use this xrootd cluster > >>>>>> cms.allow host * > >>>>>> > >>>>>> # Enable xrootd debugging > >>>>>> xrootd.trace emsg login stall redirect > >>>>>> cms.trace defer files forward redirect > >>>>>> > >>>>>> # Disable async. Related issue: > >>>>>> > https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_xrootd_xrootd_issues_1113&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=L2XeYWMRRqstD75CgZb1yCHO9dgWL2K6Uqmqto5rx_Q&e= > >>>>>> > >>>>>> xrootd.async off > >>>>>> > >>>>>> # ------------------------------------- > >>>>>> # Integrate with CMS Namespaces > >>>>>> # It will see files under /store/... > >>>>>> # ------------------------------------- > >>>>>> oss.localroot /storage/cms > >>>>>> # ------------------------------------- > >>>>>> # Configure davs/https for TPC > >>>>>> # ------------------------------------- > >>>>>> # Enable https over XrootD > >>>>>> if exec xrootd > >>>>>> xrd.protocol http:1095 /usr/lib64/libXrdHttp.so > >>>>>> http.cadir /etc/grid-security/certificates > >>>>>> http.cert /etc/grid-security/xrootd/xrootdcert.pem > >>>>>> http.key /etc/grid-security/xrootd/xrootdkey.pem > >>>>>> http.secxtractor /usr/lib64/libXrdLcmaps.so > >>>>>> http.secretkey XXXXXXX > >>>>>> # Enable third-party-copy > >>>>>> http.exthandler xrdtpc libXrdHttpTPC.so > >>>>>> # Pass the bearer token to the Xrootd authorization framework. > >>>>>> http.header2cgi Authorization authz > >>>>>> http.listingdeny yes > >>>>>> http.desthttps yes > >>>>>> http.selfhttps2http no > >>>>>> http.staticpreload > >>>>>> > https://urldefense.proofpoint.com/v2/url?u=http-3A__static_robots.txt&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=Laz4x7NvD_fTheDJu5m_cEES6_pePEidCLIAkrYNvPs&e= > > >>>>>> > >>>>>> /etc/xrootd/robots.txt > >>>>>> http.exthandler xrdmacaroons libXrdMacaroons.so > >>>>>> fi > >>>>>> > >>>>>> > >>>>>> xrd.tls /etc/grid-security/xrootd/xrootdcert.pem > >>>>>> /etc/grid-security/xrootd/xrootdkey.pem > >>>>>> xrd.tlsca certdir /etc/grid-security/certificates > >>>>>> xrootd.tls capable all > >>>>>> sec.protocol /usr/lib64 ztn > >>>>>> > >>>>>> > >>>>>> > >>>>>> xrootd.trace all > >>>>>> xrd.trace all > >>>>>> ofs.trace all > >>>>>> pfc.trace all > >>>>>> cms.trace all > >>>>>> # To debug connections to the fedration (5 Dump, 4 Debug, 3 Error, 2 > >>>>>> Warning, 1 Info) > >>>>>> pss.setopt DebugLevel 4 > >>>>>> > >>>>>> > ######################################################################## > >>>>>> Use REPLY-ALL to reply to list > >>>>>> > >>>>>> To unsubscribe from the XROOTD-L list, click the following link: > >>>>>> > https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e= > >>>>>> > >>>>>> > >>>>> > >>>>> > ######################################################################## > >>>>> Use REPLY-ALL to reply to list > >>>>> > >>>>> To unsubscribe from the XROOTD-L list, click the following link: > >>>>> > https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e= > >>>>> > >>>> > >>>> > >>>> > ######################################################################## > >>>> Use REPLY-ALL to reply to list > >>>> > >>>> To unsubscribe from the XROOTD-L list, click the following link: > >>>> > https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e= > >>>> > >>>> > >>> > >>> > ######################################################################## > >>> Use REPLY-ALL to reply to list > >>> > >>> To unsubscribe from the XROOTD-L list, click the following link: > >>> > https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e= > >>> > >>> > >> > > ######################################################################## Use REPLY-ALL to reply to list To unsubscribe from the XROOTD-L list, click the following link: https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1