VO Box Issues Summary of concerns expressed following publication of Jeff’s slides Ian Bird GDB, Bologna, 12 Oct 2005 (not necessarily the opinion of)

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Enabling, facilitating and delivering quality training in the UK and Internationally Mike Mineter Training Outreach and Education, NeSC, Edinburgh
MyProxy Guy Warner NeSC Training.
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Services Abderrahman El Kharrim
National Center for Supercomputing Applications MyProxy and GSISSH Update Von Welch National Center for Supercomputing Applications University of Illinois.
1 Deployment of an LCG Infrastructure in Australia How-To Setup the LCG Grid Middleware – A beginner's perspective Marco La Rosa
OSG End User Tools Overview OSG Grid school – March 19, 2009 Marco Mambelli - University of Chicago A brief summary about the system.
VOX Project Status T. Levshina. Talk Overview VOX Status –Registration –Globus callouts/Plug-ins –LRAS –SAZ Collaboration with VOMS EDG team Preparation.
Ákos FROHNER – DataGrid Security Requirements n° 1 Security Group D7.5 Document and Open Issues
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
Enabling Grids for E-sciencE ENEA and the EGEE project gLite and interoperability Andrea Santoro, Carlo Sciò Enea Frascati, 22 November.
PanDA Multi-User Pilot Jobs Maxim Potekhin Brookhaven National Laboratory Open Science Grid WLCG GDB Meeting CERN March 11, 2009.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
INFSO-RI Enabling Grids for E-sciencE VO BOX Summary Conclusions from Joint OSG and EGEE Operations Workshop - 3 Abingdon, 27 -
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
First attempt for validating/testing Testbed 1 Globus and middleware services WP6 Meeting, December 2001 Flavia Donno, Marco Serra for IT and WPs.
Architecture and ATLAS Western Tier 2 Wei Yang ATLAS Western Tier 2 User Forum meeting SLAC April
Maarten Litmaath (CERN), GDB meeting, CERN, 2006/02/08 VOMS deployment Extent of VOMS usage in LCG-2 –Node types gLite 3.0 Issues Conclusions.
23-Oct-03D.P.Kelsey, LCG Security Update, HEPiX1 LCG Security Update HEPiX-HEPNT, TRIUMF, 23 October 2003 David Kelsey CCLRC/RAL, UK
8-Jul-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) RAL, 8 July 2003 David Kelsey CCLRC/RAL, UK
MTA SZTAKI Hungarian Academy of Sciences Introduction to Grid portals Gergely Sipos
VO. VOMS 1. Authentication2. Credentials 3. Authentication Client Resource.
Getting started DIRAC Project. Outline  DIRAC information system  Documentation sources  DIRAC users and groups  Registration with DIRAC  Getting.
EGEE-II INFSO-RI Enabling Grids for E-sciencE The GILDA training infrastructure.
Creating and running an application.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Site Architecture Resource Center Deployment Considerations MIMOS EGEE Tutorial.
EGEE is a project funded by the European Union under contract IST Grid Access Service Predrag Buncic JRA1 Meeting, Jun
Rutherford Appleton Lab, UK VOBox Considerations from GridPP. GridPP DTeam Meeting. Wed Sep 13 th 2005.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE is a project funded by the European Union under contract IST VO box: Experiment requirements and LCG prototype Operations.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
INFSO-RI Enabling Grids for E-sciencE VOMS & MyProxy interaction Emidio Giorgio INFN NA4 Generic Applications Meeting 10 January.
Open Science Grid Build a Grid Session Siddhartha E.S University of Florida.
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
EGEE is a project funded by the European Union under contract IST Experiment Software Installation toolkit on LCG-2
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
SAM Status Update Piotr Nyczyk LCG Management Board CERN, 5 June 2007.
II EGEE conference Den Haag November, ROC-CIC status in Italy
RI EGI-TF 2010, Tutorial Managing an EGEE/EGI Virtual Organisation (VO) with EDGES bridged Desktop Resources Tutorial Robert Lovas, MTA SZTAKI.
Claudio Grandi INFN Bologna Virtual Pools for Interactive Analysis and Software Development through an Integrated Cloud Environment Claudio Grandi (INFN.
SAM architecture EGEE 07 Service Availability Monitor for the LHC experiments Simone Campana, Alessandro Di Girolamo, Nicolò Magini, Patricia Mendez Lorenzo,
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
INFSO-RI Enabling Grids for E-sciencE Padova site report Massimo Sgaravatto On behalf of the JRA1 IT-CZ Padova group.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Towards Dynamic Database Deployment LCG 3D Meeting November 24, 2005 CERN, Geneva, Switzerland Alexandre Vaniachine (ANL)
Enabling Grids for E-sciencE Claudio Cherubino INFN DGAS (Distributed Grid Accounting System)
Maarten Litmaath, GDB, 2008/06/11 1 Pilot Job Frameworks Review GDB working group mandated by WLCG MB on Jan. 22, 2008 Mission –Review security issues.
Jean-Philippe Baud, IT-GD, CERN November 2007
The EDG Testbed Deployment Details
StoRM: a SRM solution for disk based storage systems
How to connect your DG to EDGeS? Zoltán Farkas, MTA SZTAKI
MyProxy Server Installation
Security aspects of the CREAM-CE
Creating and running applications on the NGS
EGEE VO Management.
Patricia Méndez Lorenzo ALICE Offline Week CERN, 13th July 2007
Accounting at the T1/T2 Sites of the Italian Grid
CRC exercises Not happy with the way the document for testbed architecture is progressing More a collection of contributions from the mware groups rather.
Short update on the latest gLite status
Artem Trunov and EKP team EPK – Uni Karlsruhe
Artem Trunov, Günter Quast EKP – Uni Karlsruhe
Installation and Commissioning of ALICE VO-BOXES and AliEn Services
ALICE – FAIR Offline Meeting KVI (Groningen), 3-4 May 2010
Update on EDG Security (VOMS)
From Prototype to Production Grid
Grid Computing Software Interface
Presentation transcript:

VO Box Issues Summary of concerns expressed following publication of Jeff’s slides Ian Bird GDB, Bologna, 12 Oct 2005 (not necessarily the opinion of)

GDB Bologna, 12 Oct General concerns  Ops and security documents:  List of questions to help sites understand what is needed  Hard to translate into site policy – IPTables, firewalls, ports, etc.  Questionnaires are more overhead for site admins  Use of host certificates for services is never acceptable  Number of boxes – heavy tax on small sites  Do all sites need to run a VO Box?  Many sites will say NO unless the requirements are minimal  E.g. UK only 1 site willing to provide this for ALICE  Most security concerns addressed by document

GDB Bologna, 12 Oct Other concerns  This should be a short term solution  Experiments should ensure that VO specific services get translated into general grid services for the future  This is not a grid solution !  How does the software get certified?  Concerns about allowing interactive logins at all

GDB Bologna, 12 Oct LCG VO Box prototype OSG are developing “Edge Service Framework” based on virtual machines to solve the same problem.

GDB Bologna, 12 Oct VOBOX: Overview  Basic (common) requirements  Scientific Linux 3 (usually)  Outbound connectivity as a UI  Inbound connectivity as a CE + gsissh port + VO requirements  Access to local user accounts (SGMs) via gsissh  Direct (mounted) access to the site’s experiment SW installation area  LCG’s VO box prototype basic elements  gsissh server  Proxy renewal service (+ user level tool)  For automatic refresh of user credentials  For AFS-based sites with GSI-Kerberos mapping service:  GSSKLOG client to grant Kerberos tokens from X509 proxies  CLIs and APIs for job submission to local CE  Connection open for job lifetime  Not scalable!  Only for few special jobs

GDB Bologna, 12 Oct VOBOX: the gsissh server  Allows the experiment SGM to access the VO box  User space (not root access)  Interactive login through gsissh client  Upload/Download files via gsiscp  Usual authentication/authorization schema  GSI. Using the grid-mapfile  Allows credential delegation  Only within the login session  Must be turned on at the client and server side  Done automatically for both by YAIM in LCG 2.6  Running by default on port 1975  Not VOMS-aware

GDB Bologna, 12 Oct VOBOX: Proxy renewal service  Automatic SGM’s proxy renewal procedure  The SGM…  Registers a long-living proxy in a MyProxy Server  Logs into the VO box  Registers his delegated user proxy for renewal (VO box specific CLI)  The proxy renewal service renews the user proxy every 2 hours  The MyProxy server has to trust the VO box  The renewal service must present the (trusted) VO box host certificate  A root cronjob runs every hour  Creates the host proxy + "chown"s it to the VO SGM  There can be only one VO per VO box  Or they all would share same copy of host proxy  Traceability issue  Possible solutions to this problem  Run several VO boxes on the same HW, but on different virtual machines  Modify MyProxy to make it accept service certificates (several per machine)

GDB Bologna, 12 Oct VOBOX: miscellaneous  User Interface clients should also be installed  Additional functionality at no cost (just clients)  Successfully tested many times and deployed at some sites  A RB can also be installed on top of the VO box (next release)  For job submission to the local CE  (Solved) clash of two versions of the gridftp server (CE and RB)  The old one will be removed from the RPM list  Fully tested and supported in YAIM  BUT… This would need more maintenance effort from the site  Experiment SW area  An env variable points to the experiment SW area of each VO  Not automatically accessible after YAIM installation (duty of the site admin)  Same as in a WN  A gssklog client allows to get kerberos credentials from a X509 proxy  Needed only if the Exp SW area is on AFS  A X509toKRB authentication server needs to be installed at the site