Hi,
My condor installation is again reporting:
4/2 17:21:03 DaemonCore: PERMISSION DENIED to unknown user from host
<10.0.10.39:58837> for command 442 (REQUEST_CLAIM), access level DAEMON
4/2 17:21:04 DaemonCore: PERMISSION DENIED to unknown user from host
<10.0.10.39:37224> for command 443 (RELEASE_CLAIM), access level DAEMON
in the StartLog, so clearly I do not have my security settings
correct, however I really am at a loss to figure out what I should be
putting in them. The condor_config file is over 2000 lines long, and
section 3.6 (Security) is 30 pages. I've read through it 3 times, and
really am no closer to understanding what a normal setup is. I have 3
machines in my condor pool. One is the head node with a public IP
address, the other two are on a private sub-net. They have shared
home directories and a few other bits for OSG data and apps. There is
nothing out of the ordinary for this. Surely there should be some
example security policy which makes sense for this most standard of
configurations.
Regards,
Ian
Dan Bradley wrote:
Dan Bradley wrote:
However, if you just want to authenticate trusted administrative users
on each local machine, you can do that with FS authentication. Example:
# Authenticate administrative access so we can see if it
# is an administrative account local to this machine. If you
# don't allow remote administrative commands (such as condor_reconfig
-all)
# or all remote administrative commands are required to be
# authenticated via some remote authentication method such as GSI,
# then you could instead set this to REQUIRED.
SEC_ADMINISTRATOR_AUTHENTICATION = PREFERRED
ALLOW_ADMINISTRATOR = \
root@$(UID_DOMAIN)/$(FULL_HOSTNAME) \
condor@$(UID_DOMAIN)/$(FULL_HOSTNAME)
I am surprised to find that this configuration causes rejection of
unauthenticated administrative access, even if ALLOW_ADMINISTRATOR is
configured to allow it (e.g. unauthenticated access from the central
manager). I had forgotten this detail of how authentication works in
Condor.
So if you want unauthenticated remote administrative access in addition
to authenticated local administrative access (i.e. because you don't
have a method of remote user authenticated configured), then you need to
add ANONYMOUS to the allowed authentication methods. Example:
SEC_ADMINISTRATOR_AUTHENTICATION_METHODS = FS, KERBEROS, GSI, ANONYMOUS
SEC_CLIENT_AUTHENTICATION_METHODS = FS, KERBEROS, GSI, ANONYMOUS
Then you can authorize remote unauthenticated access by IP address in
addition to local authenticated access by trusted accounts:
ALLOW_ADMINISTRATOR = \
*/$(CONDOR_HOST) \
root@$(UID_DOMAIN)/$(FULL_HOSTNAME) \
condor@$(UID_DOMAIN)/$(FULL_HOSTNAME)
# clear out the older-style hostallow setting to avoid confusion
HOSTALLOW_ADMINISTRATOR =
SEC_ADMINISTRATOR_AUTHENTICATION = PREFERRED
--Dan
_______________________________________________
Condor-users mailing list
To unsubscribe, send a message to condor-users-request@xxxxxxxxxxx with a
subject: Unsubscribe
You can also unsubscribe by visiting
https://lists.cs.wisc.edu/mailman/listinfo/condor-users
The archives can be found at:
https://lists.cs.wisc.edu/archive/condor-users/
--
Ian Stokes-Rees W: http://sbgrid.org
ijstokes@xxxxxxxxxxxxxxxxxxx T: +1 617 418-4168
SBGrid, Harvard Medical School F: +1 617 432-5600
------------------------------------------------------------------------
_______________________________________________
Condor-users mailing list
To unsubscribe, send a message to condor-users-request@xxxxxxxxxxx with a
subject: Unsubscribe
You can also unsubscribe by visiting
https://lists.cs.wisc.edu/mailman/listinfo/condor-users
The archives can be found at:
https://lists.cs.wisc.edu/archive/condor-users/