[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [HTCondor-users] HTCondor 23.0.24, 23.10.24, 24.0.7, and 24.7.3 Released



Dear Developers,

many thanks for your work and the new releases.

I found
Changes in 24.7.3 include:
- EP administrators can enforce no outbound networking for jobs
[HTCONDOR-2967] intriguing. I had played a bit with systemd IPAddress{Allow,Deny} directives with the ulterior motive to constrain all the Condor hierarchy's network chattering, i.e., block Condor daemons as well as job children from reaching critical but not for the LRMS per se relevant infrastructure (like infrastructure management instances, some authz infrastructure,...). As there seemed to be some problems with the systemd release currently in use, I had put my efforts on hold for the moment. But seeing the announcement, I would be curious about your experiences, and if shaping IPAddress{Allow,Deny} drop-ins for all the Condor units would be the way to go for an admin or maybe if an extension of the network control within the job namespaces would be a reasonable idea? I.e., Condor knobs for admins to control which IP ranges daemons or starters are allowed/denied to talk to?

Cheers,
  Thomas

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature