[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[condor-users] More condor / kerberos trouble.



Hi,

So I'm still trying to move forward on getting our condor cluster kerberos-aware, and I've run into a troubling problem.

The relevant lines of my condor_config are:

CONDOR_SERVER_PRINCIPAL = host
SEC_DEFAULT_AUTHENTICATION = REQUIRED
SEC_DEFAULT_AUTHENTICATION_METHODS = KERBEROS, FS

In addition to our normal accounts on the condor cluster, which are kerberos-authenticated and have matching AFS principals (eg greenc@xxxxxxxx -> greenc) we have a couple of service accounts which are not directly related to kerberos principals. People log into this account, e898, based on the .k5login file, and will need to submit jobs as the e898 user. Unfortunately, with the above configuration in effect, we get:

clark.fnal.gov> $BOONE_CONDOR/bin/real/condor_submit sleep.sh_20040524_100217_1.cmd
Submitting job(s)
ERROR: Failed to set Owner="e898" for job 10384.0

ERROR: Failed to queue job.

From the log, we get:

5/24 10:11:23 Reading request object 5/24 10:11:23 SetAttribute security violation: setting owner to "e898" when active owner is "greenc" 5/24 10:11:45 Activity on stashed negotiator socket 5/24 10:11:45 Socket activated, but could not read command 5/24 10:11:45 (Negotiator probably invalidated cached socket)

Useful information:

<kingery.fnal.gov> whoami
e898
<kingery.fnal.gov> klist -f
Ticket cache: /tmp/krb5cc_3557_t4uz1n
Default principal: greenc@xxxxxxxx

Valid starting     Expires            Service principal
05/24/04 10:48:42  05/25/04 10:37:24  krbtgt/FNAL.GOV@xxxxxxxx
        renew until 05/25/04 12:24:04, Flags: FfPRA
05/24/04 10:48:42  05/25/04 10:37:24  afs@xxxxxxxx
        renew until 05/25/04 12:24:04, Flags: FfPRA
05/24/04 10:48:47  05/25/04 10:37:24  host/cdcvs0.fnal.gov@xxxxxxxx
        renew until 05/25/04 12:24:04, Flags: FfPRA
<kingery.fnal.gov> tokens

Tokens held by the Cache Manager:

User's (AFS ID 8483) tokens for afs@xxxxxxxx [Expires May 25 14:00]
   --End of list--

Given that we need to move to kerberos authentication to allow Condor jobs to access other machines, what is the best way to proceed? Prior to submitting the job, the user can, if required, obtain a machine principal of the type e898/e898/machine.fnal.gov@xxxxxxxx, but it's unclear what Condor would do with this.

I'd be grateful for any help. Let me know if I can provide any other information on or off-list.

Thanks for your time,
Chris.

--
Chris Green, MiniBooNE / LANL. Email greenc@xxxxxxxx
Tel: (630) 840-2167. Fax: (630) 840-3867
Condor Support Information:
http://www.cs.wisc.edu/condor/condor-support/
To Unsubscribe, send mail to majordomo@xxxxxxxxxxx with
unsubscribe condor-users <your_email_address>