Mailing List Archives
Authenticated access
|
|
|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Condor-users] Enabling SSL encryption in Condor
- Date: Wed, 19 Jul 2006 12:02:39 +0200
- From: Pascal Jermini <pascal+condor@xxxxxxxxxxxxxxxx>
- Subject: Re: [Condor-users] Enabling SSL encryption in Condor
Hello,
> Can you send the entire schedd logfile to condor-admin@xxxxxxxxxxx? I'm
> very interested in seeing the case where it works when you use
> FS and then SSL.
Logfile has been sent, and got assigned ticket number #14017.
While we are at it, I've tried to enable SSL also on Windows-based machines,
but the experience was very short, with a crash of the master daemon, which generated
the following stack trace:
//=====================================================
Exception code: C00000FD STACK_OVERFLOW
Fault address: 0046E947 01:0006D947 C:\condor\bin\condor_master.exe
Registers:
EAX:00003508
EBX:00967620
ECX:00A52574
EDX:009602F0
ESI:00967F80
EDI:00967D30
CS:EIP:001B:0046E947
SS:ESP:0023:00B4F56C EBP:00B4F5E4
DS:0023 ES:0023 FS:003B GS:0000
Flags:00010202
Call stack:
Address Frame
0046E947 00B4F5E4 _alloca_probe+17
0045E3AA 00B4F600 Authentication::authenticate+15
0045743C 00B4F630 ReliSock::perform_authenticate+7A
00457492 00B4F644 ReliSock::authenticate+13
0045ABD9 00B4FD6C SecManStartCommand::startCommand_inner+111A
00459A8D 00B4FD78 SecManStartCommand::startCommand+C
0045B601 00B4FDEC SecManStartCommand::TCPAuthConnected_inner+A0
0045B38C 00B4FE0C SecManStartCommand::TCPAuthConnected+59
004375E0 00B4FE58 DaemonCore::Driver+97C
0043F2ED 00B4FF90 dc_main+AFA
00405213 00B4FFA0 ServiceMain+5B
77DEB48B 00B4FFB4 CryptVerifySignatureW+29
7C80B50B 00B4FFEC GetModuleFileNameA+1B4
and similarly a crash of the startd:
//=====================================================
Exception code: C00000FD STACK_OVERFLOW
Fault address: 00481A37 01:00080A37 C:\condor\bin\condor_startd.exe
Registers:
EAX:00004508
EBX:00A61650
ECX:00032AA0
EDX:00A50230
ESI:00A62C40
EDI:00A62FC0
CS:EIP:001B:00481A37
SS:ESP:0023:0012EA98 EBP:0012EB10
DS:0023 ES:0023 FS:003B GS:0000
Flags:00010202
Call stack:
Address Frame
00481A37 0012EB10 _chkstk+17
00450405 0012EB2C Authentication::authenticate+15
00449EFF 0012EB5C ReliSock::perform_authenticate+7A
00449F55 0012EB70 ReliSock::authenticate+13
0044D21D 0012F298 SecManStartCommand::startCommand_inner+111A
0044C0D1 0012F2A4 SecManStartCommand::startCommand+C
0044DC45 0012F318 SecManStartCommand::TCPAuthConnected_inner+A0
0044C8D8 0012FA3C SecManStartCommand::startCommand_inner+7D5
0044C0D1 0012FA48 SecManStartCommand::startCommand+C
0044BF4E 0012FA68 SecMan::startCommand+88
004225E1 0012FAD0 Daemon::startCommand+1E5
004229EB 0012FB14 Daemon::startCommand+1CF
00422B3A 0012FB48 Daemon::startCommand+23
004330B8 0012FB78 DCCollector::sendUDPUpdate+7B
00432FB7 0012FC10 DCCollector::sendUpdate+22E
00425E3F 0012FC34 CollectorList::sendUpdates+4D
0040AACC 0012FC4C ResMgr::send_update+24
0040C95D 0012FDB8 Resource::final_update+80
0040A572 0012FDC4 ResMgr::walk+1A
0040AA98 0012FDCC ResMgr::final_update+10
00415A24 0012FDDC startd_exit+5A
00463DD2 0012FDF8 handle_dc_sigterm+B5
0040AAF9 0012FE30 ResMgr::first_eval_and_update_all+26
0046490D 0012FF68 dc_main+AFA
00464A1C 0012FF80 main+CE
00481B14 00000001 mainCRTStartup+C5
The (famous) last words of the daemons in the logs:
7/19 11:16:55 (fd:3) (pid:2740) AUTHENTICATE: can still try these methods: SSL
7/19 11:16:55 (fd:3) (pid:2740) HANDSHAKE: in handshake(my_methods = 'SSL')
7/19 11:16:55 (fd:3) (pid:2740) HANDSHAKE: handshake() - i am the client
7/19 11:16:55 (fd:3) (pid:2740) HANDSHAKE: sending (methods == 256) to server
7/19 11:16:55 (fd:3) (pid:2740) condor_read(): nfds=0
7/19 11:16:55 (fd:3) (pid:2740) condor_read(): nfound=1
7/19 11:16:55 (fd:3) (pid:2740) condor_read(): nfds=0
7/19 11:16:55 (fd:3) (pid:2740) condor_read(): nfound=1
7/19 11:16:55 (fd:3) (pid:2740) HANDSHAKE: server replied (method = 256)
7/19 11:16:55 (fd:3) (pid:2740) AUTHENTICATE: will try to use 256 (SSL)
Pascal