Hepix LAL April 2001 An alternative to ftp : bbftp Gilles Farrache In2p3 Computing Center

Slides:



Advertisements
Similar presentations
13 December 2000Tim Adye1 New KanGA Export Scheme Tim Adye Rutherford Appleton Laboratory BaBar Collaboration Meeting Data Distribution Session 13 th December.
Advertisements

Cross-site data transfer on TeraGrid using GridFTP TeraGrid06 Institute User Introduction to TeraGrid June 12 th by Krishna Muriki
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
FILE TRANSFER PROTOCOL Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring.
Universidad del Cauca Red de Datos Module 9 Remote Connections.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Chapter 26 FTP.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
1 PLuSH – Mesh Tree Fast and Robust Wide-Area Remote Execution Mikhail Afanasyev ‧ Jose Garcia ‧ Brian Lum.
APACHE SERVER By Innovationframes.com »
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
A crash course in njit’s Afs
February 2006Colby College ITS Using FTP. February 2006Colby College ITS Topics FTP Options at Colby For Mac Users For Windows Users.
SSH Secure Login Connections over the Internet
Chapter 31 File Transfer & Remote File Access (NFS)
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
For more notes and topics visit:
Chapter 7: Using Windows Servers to Share Information.
Distributed Computing Systems Project 2 – Distributed Shell Due: Friday, April 4 th.
1 Web Server Administration Chapter 9 Extending the Web Environment.
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago.
Globus GridFTP: What’s New in 2007 Raj Kettimuthu Argonne National Laboratory and The University of Chicago.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Daemon issue 14 SSH Port Forwarding Yannis Tsopokis Wednesday, April 26 th 2006.
2nd April 2001Tim Adye1 Bulk Data Transfer Tools Tim Adye BaBar / Rutherford Appleton Laboratory UK HEP System Managers’ Meeting 2 nd April 2001.
Jean-Yves Nief CC-IN2P3, Lyon HEPiX-HEPNT, Fermilab October 22nd – 25th, 2002.
1 INFO 321 Server Technologies II FTP Material adapted from Dr. Randy Kaplan.
Secure Shell Mike Griffiths & Deniz Savas CiCS Dept Sheffield University November 2005.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Network Tests at CHEP K. Kwon, D. Han, K. Cho, J.S. Suh, D. Son Center for High Energy Physics, KNU, Korea H. Park Supercomputing Center, KISTI, Korea.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Chapter 34 Internet Applications (Telnet, FTP).
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Produced;: Tartu Kutsehariduskeskus FTP – File Transfer Protocol Maarja Kask ACTION PROGRAMME OF THE EUROPEAN UNION LEONARDO DA VINCI PROJEKT NO.: 2002.
SSH Tricks for CSF Slide 1 NEbraskaCERT SSH Tricks Matthew G. Marsh 05/21/03.
Team 6 Decrypting Encryption Jeffrey Vordick, Charles Sheefel, and Shyam Rasaily.
Internet FTP to network. Preliminary Steps a FTP program is used and executed such as WS_FTP LE Information needed –host name –user id –password.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
ALCF Argonne Leadership Computing Facility GridFTP Roadmap Bill Allcock (on behalf of the GridFTP team) Argonne National Laboratory.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
15 December 2000Tim Adye1 Data Distribution Tim Adye Rutherford Appleton Laboratory BaBar Collaboration Meeting 15 th December 2000.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
A Sneak Peak of What’s New in Globus GridFTP John Bresnahan Michael Link Raj Kettimuthu (Presenting) Argonne National Laboratory and The University of.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Example security systems n Kerberos n Secure shell.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
11th September 2002Tim Adye1 BaBar Experience Tim Adye Rutherford Appleton Laboratory PPNCG Meeting Brighton 11 th September 2002.
Secure services Unit-IV CHAP-1
Chapter 7: Using Windows Servers
FTP Lecture supp.
SECURE SHELL MONIKA GUPTA COT 4810.
SAM at CCIN2P3 configuration issues
Networking Applications
FTP - File Transfer Protocol
File Transfer Protocol
IS 4506 Server Configuration (HTTP Server)
Configuring Internet-related services
CIS 155 Lecture 10, Farewell to UNIX
Internet Applications (Telnet, FTP)
IMovie sits at the center of the iLife suite, integrating iTunes, iPhoto, and iDVD to help create professional-looking films with music, titles, and effects. 
Presentation transcript:

Hepix LAL April 2001 An alternative to ftp : bbftp Gilles Farrache In2p3 Computing Center

Hepix LAL April 2001 Gilles Farrache 2 History  In 1999, the members of the French Babar collaboration decided to import from SLAC to Lyon a big part of the SLAC objectivity database  First approach : via tapes  Needs a lot of manpower  Problems with cartridge compatibility  Delay between data production at SLAC and their availability in Lyon quite long

Hepix LAL April 2001 Gilles Farrache 3 History  Second approach : via the network using standard ftp  Security problems :  Username and password flying unencrypted  Username and password present in.netrc file  Performances problems ( Maximum bandwidth available at this time between SLAC and Lyon was 6 Mbps ) :  Throughput performance on one ftp session : 80 Kbytes/s  ~Seven hours for one two-gigabytes file

Hepix LAL April 2001 Gilles Farrache 4 History  First idea to improve ftp performances : Start n concurrent ftp Total throughput reaches 3.5 Mbps  But you still need no network outage for seven hours  Second idea to improve ftp performances : Cut the file in n parts Start n concurrent ftp (one for each part) Rebuild the file  But you double the disk space usage at each endpoint

Hepix LAL April 2001 Gilles Farrache 5 Goals  Improve performances on single file transfer  Optimize disk space usage  Improve security

Hepix LAL April 2001 Gilles Farrache 6 Performance improvements  Use several TCP streams to transfer a file  Use large TCP windows (RFC 1323)  Compress the data on the fly (using gzip algorithm)

Hepix LAL April 2001 Gilles Farrache 7 Performance improvements  The client opens a control connection to the server  Exchange control information  Each side starts as many processes as requested, each process will send a slice of the file.

Hepix LAL April 2001 Gilles Farrache 8 Performance improvements 100 MB file compress uncompress bbftp client process bbftp server process 100 MB file

Hepix LAL April 2001 Gilles Farrache 9 Performance improvements  Compression plus parallel streams lead to throughput between 7 and 20 Mbps on the 6 Mbps link (often 12 Mbps with a standard Babar file)  But with higher speed links (34 Mbps), compression often reduces performance due to lack of CPU (perhaps we have to use another algorithm)

Hepix LAL April 2001 Gilles Farrache 10 Security improvements  Standard bbftp connection method Use RSA encryption methods to transfer username and password  SSH bbftp connection method (Tim Adye’s idea) Use ssh to remotely start the server

Hepix LAL April 2001 Gilles Farrache 11 Security improvements  Standard bbftp connection method client server connection RSA key pair generation send public key Crypt user name and password using the public key send encrypted data Decrypt user name and password using the private key OK or BAD

Hepix LAL April 2001 Gilles Farrache 12 Security improvements  Standard bbftp connection method without password Start a bbftpcd client which will keep the username and password in memory Start a bbftpc client which will talk with bbftpcd and will give it the command to execute Limitation : bbftpcd and bbftpc have to run on the same computer

Hepix LAL April 2001 Gilles Farrache 13 Security improvements  SSH bbftp connection method client SSHD start the bbftpd process Start a ssh client like ssh -x -l username “bbftpd -s” host SSH clientSSH daemon bbftpd process Use the encrypted connection as control connection

Hepix LAL April 2001 Gilles Farrache 14 Security improvements  SSH bbftp connection method without password If the sshd server side allows the RSA authentication, a connection without any password is possible

Hepix LAL April 2001 Gilles Farrache 15 BBFTP state of the art  Current version patch03  Possibility to play with : TCP window size Read (Write) buffer size Compression Automatic directory creation File mode File access time Number of streams Remote and local umask.bbftprc file RFIO

Hepix LAL April 2001 Gilles Farrache 16 BBFTP state of the art  Current commands : cd get put lcd mkdir mget mput

Hepix LAL April 2001 Gilles Farrache 17 BBFTP state of the art  Control file example : 1 setnbstream 20 2 setremoteumask setoption nocreatedir 4 put /home/babar/jon/f1 /home/babar/bbrdist/newfiles/f1 5 setoption createdir 6 put /home/babar/jon/f1 /home/babar/bbrdist/newfiles/f1 7 setnbstream 5 8 setrecvwinsize setoption gzip 10 put /home/babar/jon/f2 /home/babar/bbrdist/newfiles/f2

Hepix LAL April 2001 Gilles Farrache 18 BBFTP state of the art  BBFTP home page :  BBFTP discussion list : Archives on :  Current experiments or sites using it : PHENIX ALICE (project)