INFSO-RI-508833 Enabling Grids for E-sciencE www.eu-egee.org Glexec Gerben Venekamp NIKHEF.

Slides:



Advertisements
Similar presentations
Security middleware Andrew McNab University of Manchester.
Advertisements

GUMS status Gabriele Carcassi PPDG Common Project 12/9/2004.
OSG AuthZ Architecture AuthZ Components Legend VO Management Services Grid Site GUMS Site Services SAZ CE Gatekeeper Prima Is Auth? Yes / No SE SRM gPlazma.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
The GridSite Security Framework Andrew McNab University of Manchester.
INFSO-RI Enabling Grids for E-sciencE Glexec overview Gerben Venekamp NIKHEF.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Zach Miller Condor Project Computer Sciences Department University of Wisconsin-Madison Flexible Data Placement Mechanisms in Condor.
INFSO-RI Enabling Grids for E-sciencE XACML and G-PBox update MWSG 14-15/09/2005 Presenter: Vincenzo Ciaschini.
INFSO-RI Enabling Grids for E-sciencE SAML-XACML AuthZ Interface Analysis and design suggestions Yuri Demchenko SNE Group, University.
Andrew McNab - GACL - 16 Dec 2003 Grid Access Control Language Andrew McNab, University of Manchester
3 May 2006 GridSite Andrew McNabwww.gridsite.org Web Services for Grids in Scripts and C using GridSite Andrew McNab University of.
INFSO-RI Enabling Grids for E-sciencE gLExec, SCAS and the paths forward Introduction to pilot jobs and gLExec and SCAS framework.
Rsv-control Marco Mambelli – Site Coordination meeting October 1, 2009.
INFSO-RI Enabling Grids for E-sciencE gLExec and OS compatibility David Groep Nikhef.
VOX Project Status T. Levshina. Talk Overview VOX Status –Registration –Globus callouts/Plug-ins –LRAS –SAZ Collaboration with VOMS EDG team Preparation.
INFSO-RI Enabling Grids for E-sciencE Logging and Bookkeeping and Job Provenance Services Ludek Matyska (CESNET) on behalf of the.
May 8, 20071/15 VO Services Project – Status Report Gabriele Garzoglio VO Services Project – Status Report Overview and Plans May 8, 2007 Computing Division,
The GridSite Security System Andrew McNab and Shiv Kaushal University of Manchester.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
PanDA Multi-User Pilot Jobs Maxim Potekhin Brookhaven National Laboratory Open Science Grid WLCG GDB Meeting CERN March 11, 2009.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security and Job Management.
Hands On UNIX II Dorcas Muthoni. Processes A running instance of a program is called a "process" Identified by a numeric process id (pid)‏  unique while.
Maarten Litmaath (CERN), GDB meeting, CERN, 2006/02/08 VOMS deployment Extent of VOMS usage in LCG-2 –Node types gLite 3.0 Issues Conclusions.
INFSO-RI Enabling Grids for E-sciencE SCDB C. Loomis / Michel Jouvin (LAL-Orsay) Quattor Tutorial LCG T2 Workshop June 16, 2006.
INFSO-RI Enabling Grids for E-sciencE Site access control issues (a sneak preview of DJRA3.2) Martijn Steenbakkers for JRA3 Universiteit.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Direct gLExec integration with PanDA Fernando H. Barreiro Megino CERN IT-ES-VOS.
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep NIKHEF.
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep et al. NIKHEF.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Joni Hahkala, UH-HIP On behalf of JRA3 JRA1 AH March 22-24, 2006.
OSG AuthZ components Dane Skow Gabriele Carcassi.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Enabling Grids for E-sciencE Workload Management System on gLite middleware - commands Matthieu Reichstadt CNRS/IN2P3 ACGRID School, Hanoi.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
INFSO-RI Enabling Grids for E-sciencE glexec deployment models local credentials and grid identity mapping in the presence of complex.
Database authentication in CORAL and COOL Database authentication in CORAL and COOL Giacomo Govi Giacomo Govi CERN IT/PSS CERN IT/PSS On behalf of the.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks New Authorization Service Christoph Witzig,
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
INFSO-RI Enabling Grids for E-sciencE glexec deployment models local credentials and grid identity mapping in the presence of complex.
Dynamic Creation and Management of Runtime Environments in the Grid Kate Keahey Matei Ripeanu Karl Doering.
INFSO-RI Enabling Grids for E-sciencE /10/20054th EGEE Conference - Pisa1 gLite Configuration and Deployment Models JRA1 Integration.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Update Authorization Service Christoph Witzig,
INFSO-RI Enabling Grids for E-sciencE - II SLCS, VASH, and LCAS/LCMAPS Plugins All-Hands Meeting Helsinki Placi Flury, SWITCH 19.
INFSO-RI Enabling Grids for E-sciencE glexec on worker nodes David Groep NIKHEF.
INFSO-RI Enabling Grids for E-sciencE VOMS & MyProxy interaction Emidio Giorgio INFN NA4 Generic Applications Meeting 10 January.
INFSO-RI Enabling Grids for E-sciencE SAML-XACML interoperability Oscar Koeroo.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSI with OpenSSL Vincenzo Ciaschini EGEE-3.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
INFSO-RI Enabling Grids for E-sciencE DGAS, current status & plans Andrea Guarise EGEE JRA1 All Hands Meeting Plzen July 11th, 2006.
Gridification progress report David Groep, Oscar Koeroo Wim Som de Cerff, Gerben Venekamp Martijn Steenbakkers.
Security and VO management enhancements in Panda Workload Management System Jose Caballero Maxim Potekhin Torre Wenaus Presented by Maxim Potekhin at HPDC08.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Study on Authorization Christoph Witzig,
EGEE-III INFSO-RI Enabling Grids for E-sciencE VO Authorization in EGEE Erwin Laure EGEE Technical Director Joint EGEE and OSG Workshop.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Job Management Claudio Grandi.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
INFSO-RI Enabling Grids for E-sciencE GUMS vs. LCMAPS Oscar Koeroo.
EGEE is a project funded by the European Union under contract IST Datamat Status Report F. Pacini Datamat S.p.a. Milan, IT-CZ JRA1 meeting,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks CREAM: current status and next steps EGEE-JRA1.
Why you should care about glexec OSG Site Administrator’s Meeting Written by Igor Sfiligoi Presented by Alain Roy Hint: It’s about security.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Argus gLite Authorization Service Workplan.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Argus: command line usage and banning Christoph.
Dynamic Accounts: Identity Management for Site Operations Kate Keahey R. Ananthakrishnan, T. Freeman, R. Madduri, F. Siebenlist.
Security aspects of the CREAM-CE
Operating a glideinWMS frontend by Igor Sfiligoi (UCSD)
Glexec deployment models local credentials and grid identity mapping in the presence of complex schedulers David Groep NIKHEF.
Global Banning List and Authorization Service
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE Glexec Gerben Venekamp NIKHEF

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 2 Contents Isolation/sandboxing components Why do we need glexec (and gsexec)? How does glexec fit in the gLite architecture? Comparison between glexec and gsexec How can glexec be invoked? Status

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 3 Isolation (sandboxing) Roadmap –virtualization of resources (VM) or assigning of local credentials –should be transparent for the user EGEE-I Architecture –only based on credential mapping (although VM solution is coming close!) –do as little as possible with ‘root’ privileges: “suexec” wrapper functionality is needed. –minimizing local management: poolaccounts & poolgroups –credential mapping and manipulation: LCMAPS –management capabilities on these accounts: WorkSpace Service (WSS)

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 4 ‘suexec’ requirements Do as little as possible with ‘root’ privileges toAllow VO-services to use (pool)accounts for each user job In- and outgoing pipes, file descriptors should be preserved as much as possible. Should be usable by C/C++ and java services: program executable. Sites should still be able to control the access to their resources Apache’s suEXEC fulfills many of these requirements –Safe code, has proven itself –Works with apache –2 clones from apache’s suEXEC: gsexec (part of gridsite) and glexec (part of gLite)

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 5 Scenario I: Apache

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 6 Scenario II: Cream

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 7 Scenario III: Condor/WSS

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 8 Glexec Can be used by VO services Input: user proxy, executable + args Optional input in “verify” mode: uid, gid Uses LCAS to –check the user ban/white list –verify the user proxy (validity, lifetime, full/limited, CRL) –Hold the executable against a whitelist. Uses LCMAPS to do the account mapping –Dry-run is used in “verify” mode Copies and chowns the delegated user proxy Code in org.glite.security.glexec gsexec ‘versus’ glexec Glexec (cont’d) More configuration options Includes fork() wrapper library –returns the pid to the calling application –C api Gsexec Only for site-controlled services Input: user DN, executable + args Uses traditional (non-VOMS, DN- based) poolaccount mapping Code resides in org.gridsite.core Not very configurable (on purpose)

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 9 Usage of glexec (1) Two run-modes depending on setuid bit settings: 1.glexec is setuid-root: setuid()/setgid() to local user in glexec code and execute the program -r-s--x--- 1 root apache /usr/sbin/glexec In the next release: 2.glexec runs as special user: glexec uses sudo for identity switching and program execution: -r-s--x--- 1 glexec glexec /opt/glite/sbin/glexec  sudo preserves only stdin, stdout, stderr  sudo can be configured to allow the user “ glexec” to run a predefined set of programs ( blahp, qsub )

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 10 Usage of glexec (2) Environment variables to be set before calling glexec –GLEXEC_MODE:  “lcmaps_verify_account”: glexec  “lcmaps_get_account”: glexec –SSL_CLIENT_CERT and SSL_CLIENT_CERT_ : PEM- encoded strings containing the proxy cert and chain components. –X509_USER_PROXY: the location of the (delegated) proxy to be used by the user job before copy to the home directory. –TARGET_PROXY_FILE: the location where the proxy should be copied to. Is this really required by CREAM? –GLEXEC_ID (optional): unique job id to be used as an index for the jobrepository All other environment variables are cleared

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 11 Usage of glexec (3) Configuration: At compilation time the default defines in the apache headers ( /usr/include/httpd/*.h ) are overridden by glexec.h –Contains at the moment hardcoded locations of lcas and lcmaps config files –Next version will use a configuration file instead. lcas and lcmaps use the following config files: – /opt/glite/etc/lcas/lcas-glexec.db – /opt/glite/etc/lcmaps/lcmaps-glexec.db

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 12 Usage of glexec (4) Fork wrapper C api: typedef struct { char *target_user; char *target_group; char *command; } glexec_args_t; pid_t glexec_fork(glexec_args_t *args); Forks off the user process and returns the process id

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 13 Status gsexec available in gridsite version glexec: –waiting for bug in lcmaps to be fixed and the proxy verification plugin. –Needs further debugging and testing

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 14 Plans Integration on prototype with CREAM and Condor Replace callouts to LCAS and LCMAPS by a callout to Workspace service (a.k.a. the full scenario). –Workspace bind service Use of sudo Use of a glexec configuration file Interoperability: use the common standardized authZ/mapping callout interface (OSG collaboration)

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 15 Questions Questions?

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 16 Goals Generic access control to services –Authentication –Authorization –for legacy applications & file access, networks, … Sites are always in control of their resources Flexibility, scalability Allow for central control in a site Converge to a single policy format Standardization of configuration Address requirements from NA4, SAAA-RG, and others (incorporated in MJRA3.1 “user requirements”)

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 17 Workspace Service and LCMAPS Workspace Service (WSS) is part of GT4-core and in gLite-1 (preview) –Account creation and account management Provides lifetime management and will provide quota management Account clean-up mechanism: –Possibility to put account in quarantine first –Example clean-up script provided Access control to Workspace Service based on DN and VOMS attr. Access control to account –Currently based on DN –Will provide ACLs on VOMS attributes (?) Support of poolaccounts –Clean-up of poolaccounts –Uses LCMAPS as a back-end to manage gridmapdir (poolindex)

Enabling Grids for E-sciencE INFSO-RI MWSG meeting 26 October 2005, Pisa 18 Condor schedd lcmaps.db groupmapfile grid-mapfile lcmaps.db groupmapfile grid-mapfile WMS WorkSpace Service GK Gridmapdir poolindices Plug-ins %2fo%3ddutchgrid%2fo%3dusers%2 fo%3dnikhef%2fcn%3dmartijn%20s teenbakkers%3atlas atlas001 […] Voms poolaccount poolaccount Setuid, setgid LCMAPS       Workspace Service  quarantine and terminate LCMAPS and the WSS in gLite-1