That is correct, Matevz

On Tue, Feb 15, 2022, 18:39 Matevz Tadel <[log in to unmask]> wrote:
Thank you Andy!

The error is permanent, I think. Justas, can you please confirm?

Matevz

On 2/15/22 17:49, Andrew Hanushevsky wrote:
> Here are the common problems when the client issues that message:
>
> 1) The certificate's chain of trust is broken (could be because the root CA
> can't be verified, or the root/intermediate certificate has expired). This would
> cause sproradic failures (note that if the certificate is improperly installed
> then the failure would always occur which is not the case here).
>
> 2) The certificate must be renewed before the expiry of the certificate to avoid
> any conflict arising out of time violation. Ensure that the date/time is set
> correctly on your computer since that might be used to assess the validity
> period of the SSL certificate of the website. This would cause repated failures
> on some sites but not others depending on how close the cert was to expiring.
>
> 3) The certificate structure is broken, or the certificate's signature can't be
> checked. This is the hardest to solve but one reason could me random memory
> corruption. I would suggest runningthe client with valgrind and try to match the
> valgring log with the invalid cert message.
>
> 4) Firewall issues may cause problems with they have been enabled for
> "encrypted/SSL scanning or checking."
>
> 5) If tghe server is using only SHA-1 encryption then those cert are flagged as
> insecure and need to update their security certificates. However, would most
> likely cause permanent errors.
>
> Andy
>
>
>
> On Tue, 15 Feb 2022, Matevz Tadel wrote:
>
>> Andy,
>>
>> What's with the invalid certificate in the client log?
>>
>> [2022-02-15 09:56:19.549139 -0800][Debug  ][XRootDTransport   ]
>> [transfer-9.ultralight.org:1095.0] Sending out kXR_login request, username:
>> root, cgi:
>> ?xrd.cc=us&xrd.tz=-8&xrd.appname=xrdcp&xrd.info=&xrd.hostname=xrd-cache-3.ultralight.org&xrd.rn=v5.2.0,
>> dual-stack: true, private IPv4: false, private IPv6: false
>> [2022-02-15 09:56:19.549209 -0800][Debug  ][AsyncSock         ]
>> [transfer-9.ultralight.org:1095.0] TLS hand-shake exchange.
>>
>> ===> HERE:
>> [2022-02-15 09:56:19.551762 -0800][Error  ][TlsMsg            ] [TLS_Context:]
>> Unable to create TLS context; invalid certificate.
>>
>> [2022-02-15 09:56:19.551903 -0800][Error  ][AsyncSock         ]
>> [transfer-9.ultralight.org:1095.0] Socket error while handshaking: [FATAL] TLS
>> error
>> [2022-02-15 09:56:19.551920 -0800][Debug  ][AsyncSock         ]
>> [transfer-9.ultralight.org:1095.0] Closing the socket
>>
>> Can I run in gdb to get more info? What is good place to start poking?
>>
>> I was assuming it's the server cert that client does not like ... but it does
>> look ok to me :)
>>
>> Matevz
>>
>>
>> On 2/15/22 14:04, Andrew Hanushevsky wrote:
>>> Hi Bockjoo,
>>>
>>> Unfortunately, that's not the way it works. While gsi doesn't need to use TLS
>>> ztn does. Since the erver doesn't know which protocol the client will eventually
>>> settle on, the connection has to use TLS right from the start. That means you
>>> cannot use ztn with incapable clients.
>>>
>>> Andy
>>>
>>>
>>> On Tue, 15 Feb 2022, Bockjoo Kim wrote:
>>>
>>>> Hi Andy,
>>>>
>>>> There are two sec.protocols: gsi and ztn.
>>>>
>>>> Doesn't the interaction go through gsi and if it fails, will it go through ztn?
>>>>
>>>> For incapable clients, the gsi can succeed, no?
>>>>
>>>> Thanks,
>>>>
>>>> Bockjoo
>>>>
>>>> On 2/15/22 14:52, Andrew Hanushevsky wrote:
>>>>> Hi Justas,
>>>>>
>>>>> If you look into the log you will notice a warning that tells you that TLS
>>>>> will always be on regardless of the "capable" setting because authentication
>>>>> protocol ztn requires tls. So, this may be the source of the problem,
>>>>> certainly it will be for incapable clients.
>>>>>
>>>>> Andy
>>>>>
>>>>>
>>>>> On Tue, 15 Feb 2022, Justas Balcas wrote:
>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> Server's/Clients are running > 5.3.X release (not 5.4). I took out 1 server
>>>>>> from prod and played with full debug mode, on/off tls.
>>>>>>
>>>>>> Logs from server/client are available here:
>>>>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__login-2D1.hep.caltech.edu_-7Ejbalcas_tls_&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=tns3GlZokUnAN9f_4ZHOR1kQXE0DrfqOgDK3bos6dS4&e=
>>>>>>
>>>>>>
>>>>>> To turn TLS, I added this config:
>>>>>> xrd.tls /etc/grid-security/xrootd/xrootdcert.pem
>>>>>> /etc/grid-security/xrootd/xrootdkey.pem
>>>>>> xrd.tlsca certdir /etc/grid-security/certificates
>>>>>> xrootd.tls capable all
>>>>>> sec.protocol /usr/lib64 ztn
>>>>>>
>>>>>> And with TLS on - I always get:
>>>>>> TLS hand-shake exchange.
>>>>>> Socket error while handshaking: [FATAL] TLS error
>>>>>> Closing the socket
>>>>>>
>>>>>>
>>>>>> If it helps, here is full config:
>>>>>>
>>>>>> all.export /tmp stage
>>>>>> frm.xfr.copycmd /bin/cp /dev/null $PFN
>>>>>> all.adminpath /var/spool/xrootd
>>>>>> all.pidpath /var/run/xrootd
>>>>>>
>>>>>> # XrootD Security
>>>>>> # ---------------------------------------
>>>>>> xrootd.seclib /usr/lib64/libXrdSec.so
>>>>>> sec.protocol /usr/lib64 gsi -certdir:/etc/grid-security/certificates
>>>>>> -cert:/etc/grid-security/xrootd/xrootdcert.pem
>>>>>> -key:/etc/grid-security/xrootd/xrootdkey.pem -crl:3
>>>>>> -authzfun:libXrdLcmaps.so -authzto:900
>>>>>> -authzfunparms:lcmapscfg=/etc/xrootd/lcmaps.cfg -gmapopt:10 -gmapto:0
>>>>>> acc.authdb /etc/xrootd/auth_file_stageout
>>>>>> ofs.authorize
>>>>>> macaroons.secretkey /etc/xrootd/macaroon-secret
>>>>>> ofs.authlib ++ libXrdMacaroons.so
>>>>>> ofs.authlib ++ libXrdAccSciTokens.so
>>>>>> # --------------------------------------
>>>>>> # XrootD Monitoring
>>>>>> # --------------------------------------
>>>>>> # Monitoring for AAA Dashboard :
>>>>>> xrd.report 169.228.130.91:9931 every 30s all sync
>>>>>> xrootd.monitor all auth flush 30s window 5s fstat 60 lfn ops xfr 5 dest
>>>>>> files io info user 169.228.130.91:9930 dest fstat info user
>>>>>> xrd-mon.osgstorage.org:9930
>>>>>> all.sitename T2_US_Caltech
>>>>>> # -------------------------------------
>>>>>> # Configure redirector/server
>>>>>> # -------------------------------------
>>>>>> set xrdr = xrootd-redir-stageout.ultralight.org
>>>>>> xrd.port 1095
>>>>>> all.manager $(xrdr):1213
>>>>>>
>>>>>> if $(xrdr)
>>>>>>  # It's role is manager
>>>>>>  all.role manager
>>>>>>  # Redirect all lookup calls to original data servers. Redirector does not
>>>>>> have visibility of FS
>>>>>>  cms.dfs lookup distrib mdhold 20m redirect immed
>>>>>> else
>>>>>>  # Role is server
>>>>>>  all.role server
>>>>>>  # The known managers (local redirector)
>>>>>>  all.manager meta $(xrdr):1213
>>>>>>
>>>>>>  # Enable xrootd checksum calculation "on-the-fly" using multiuser plugin
>>>>>>  # This makes XRootD to write the files with the
>>>>>>  # ownership of the user that authenticated to the server and not as the
>>>>>>  # 'xrootd' user
>>>>>>  ofs.osslib ++ libXrdMultiuser.so
>>>>>>  # Enable the checksum wrapper
>>>>>>  ofs.ckslib * libXrdMultiuser.so
>>>>>>  # Control of checksum
>>>>>>  xrootd.chksum max 10 adler32
>>>>>>  multiuser.checksumonwrite on
>>>>>>  multiuser.umask 0002
>>>>>>
>>>>>> fi
>>>>>> # -------------------------------------
>>>>>> # Allow only specific path, checksum config
>>>>>> # -------------------------------------
>>>>>> # Allow any path to be exported; this is further refined in the authfile.
>>>>>> all.export /
>>>>>>
>>>>>> # Hosts allowed to use this xrootd cluster
>>>>>> cms.allow host *
>>>>>>
>>>>>> # Enable xrootd debugging
>>>>>> xrootd.trace emsg login stall redirect
>>>>>> cms.trace defer files forward redirect
>>>>>>
>>>>>> # Disable async. Related issue:
>>>>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_xrootd_xrootd_issues_1113&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=L2XeYWMRRqstD75CgZb1yCHO9dgWL2K6Uqmqto5rx_Q&e=
>>>>>>
>>>>>> xrootd.async off
>>>>>>
>>>>>> # -------------------------------------
>>>>>> # Integrate with CMS Namespaces
>>>>>> # It will see files under /store/...
>>>>>> # -------------------------------------
>>>>>> oss.localroot /storage/cms
>>>>>> # -------------------------------------
>>>>>> # Configure davs/https for TPC
>>>>>> # -------------------------------------
>>>>>> # Enable https over XrootD
>>>>>> if exec xrootd
>>>>>>  xrd.protocol http:1095 /usr/lib64/libXrdHttp.so
>>>>>>  http.cadir /etc/grid-security/certificates
>>>>>>  http.cert /etc/grid-security/xrootd/xrootdcert.pem
>>>>>>  http.key /etc/grid-security/xrootd/xrootdkey.pem
>>>>>>  http.secxtractor /usr/lib64/libXrdLcmaps.so
>>>>>>  http.secretkey XXXXXXX
>>>>>>  # Enable third-party-copy
>>>>>>  http.exthandler xrdtpc libXrdHttpTPC.so
>>>>>>  # Pass the bearer token to the Xrootd authorization framework.
>>>>>>  http.header2cgi Authorization authz
>>>>>>  http.listingdeny yes
>>>>>>  http.desthttps yes
>>>>>>  http.selfhttps2http no
>>>>>>  http.staticpreload
>>>>>> https://urldefense.proofpoint.com/v2/url?u=http-3A__static_robots.txt&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=Laz4x7NvD_fTheDJu5m_cEES6_pePEidCLIAkrYNvPs&e= 
>>>>>>
>>>>>> /etc/xrootd/robots.txt
>>>>>>  http.exthandler xrdmacaroons libXrdMacaroons.so
>>>>>> fi
>>>>>>
>>>>>>
>>>>>> xrd.tls /etc/grid-security/xrootd/xrootdcert.pem
>>>>>> /etc/grid-security/xrootd/xrootdkey.pem
>>>>>> xrd.tlsca certdir /etc/grid-security/certificates
>>>>>> xrootd.tls capable all
>>>>>> sec.protocol /usr/lib64 ztn
>>>>>>
>>>>>>
>>>>>>
>>>>>> xrootd.trace all
>>>>>> xrd.trace    all
>>>>>> ofs.trace    all
>>>>>> pfc.trace    all
>>>>>> cms.trace    all
>>>>>> # To debug connections to the fedration (5 Dump, 4 Debug, 3 Error, 2
>>>>>> Warning, 1 Info)
>>>>>> pss.setopt   DebugLevel 4
>>>>>>
>>>>>> ########################################################################
>>>>>> Use REPLY-ALL to reply to list
>>>>>>
>>>>>> To unsubscribe from the XROOTD-L list, click the following link:
>>>>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>>>>>>
>>>>>>
>>>>>
>>>>> ########################################################################
>>>>> Use REPLY-ALL to reply to list
>>>>>
>>>>> To unsubscribe from the XROOTD-L list, click the following link:
>>>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>>>>>
>>>>
>>>>
>>>> ########################################################################
>>>> Use REPLY-ALL to reply to list
>>>>
>>>> To unsubscribe from the XROOTD-L list, click the following link:
>>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>>>>
>>>>
>>>
>>> ########################################################################
>>> Use REPLY-ALL to reply to list
>>>
>>> To unsubscribe from the XROOTD-L list, click the following link:
>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__listserv.slac.stanford.edu_cgi-2Dbin_wa-3FSUBED1-3DXROOTD-2DL-26A-3D1&d=DwIDaQ&c=-35OiAkTchMrZOngvJPOeA&r=f2PhPg2_OoVvPAKGXfp4WG1YcdhQC9qsy2uMHw3Z_6k&m=cxGPTdnshuISdao1V4PsW-krXJuMxpk57T8cXetcP32UCNNa9pgqm--1NTcRuVNW&s=nmhVko_mWVLPvjSwEKtKkm17GDZSKRYlu7FW5xSiWAg&e=
>>>
>>>
>>



Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-L list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-L&A=1