JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for LCG-ROLLOUT Archives


LCG-ROLLOUT Archives

LCG-ROLLOUT Archives


LCG-ROLLOUT@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

LCG-ROLLOUT Home

LCG-ROLLOUT Home

LCG-ROLLOUT  December 2012

LCG-ROLLOUT December 2012

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

Re: APEL_PUBLISH_USER_DN :: is it required or mandatory?

From:

Adrian Sevcenco <[log in to unmask]>

Reply-To:

LHC Computer Grid - Rollout <[log in to unmask]>

Date:

Mon, 3 Dec 2012 21:21:13 +0200

Content-Type:

multipart/signed

Parts/Attachments:

Parts/Attachments

text/plain (196 lines) , smime.p7s (196 lines)

On 12/03/2012 07:14 PM, Peter Solagna wrote:
> Dear Adrian,
>   please, find some answers inline.
Hi and thanks for taking time for answering,

> On 3 December 2012 16:15, Adrian Sevcenco <[log in to unmask]
> <mailto:[log in to unmask]>> wrote:
>
>     Well this is something to be discussed between WLCG and EGI.
>
>
> There is a WLCG representative in the EGI Security Policy Group, who
> defined the policy, we all want that the main user of EGI infrastructure
> is aware of the policies we produce.
ok.. If the feedback from VOs and especially from WLCG VOs was ok i have 
nothing to say on this .. maybe i missed the mails when the VOs 
communicated to their contributors the results of this discussions.

>     More on the technical point i dont understand why this is something
>     to be done OVERALL !! This should be done at VO level and accepted
>     and signed at the moment of entry in VO (user) or at the moment of
>     participation acceptance (site).
>     To account personal information by parties which are NOT the VOs is
>     insane (IMHO). This should be enabled at VO level and only at VO
>     request.
>
>
> VO users must be aware of the policies currently affecting their usage
> of the EGI infrastructure, as expressed in the AUP:
> << Members and Managers of the VO agree to be bound by the Grid
> Acceptable Usage Rules, VO Security Policy and other relevant Grid
> Policies, and to use the Grid only in the furtherance of the stated goal
> of the VO. >>
ok

> The  Grid Policy on the Handling of User-Level Job Accounting Data says:
> <<Each site is responsible for sending its accounting records on a
> regular basis, e.g. daily, with at least user DNs encrypted in
> transport, to a central data base defined by the Grid.>> and
> <<Access to a portal that allows the decoding of the anonymised name
> into a person’s DN is restricted to individuals in the VO appointed to
> be VO Resource Managers.>>
>
> That means that users are aware of the fact that the accounting data can
where is this meaning in the paragraph above? Unless is written 
explicitly in their AUP the users dont know.

> be stored centrally including the User DN of their jobs, nevertheless
> the user level data is not going to be disclosed to entities external
> from the VO, if not specific members of EGI Operations and Security, but
> only for very specific use cases.
>
>
>         Why sites must do anything if "we do not know who" ask as to do it?
>
>     well the submitter is EGI Operations Officer so is not someone unknown..
>
>
> Yes, this requirement is coming from EGI Operations, the policies should
> be known to sites participating to the infrastructure.
>
>     In the document refereed to in ticket
>     (https://documents.egi.eu/__public/ShowDocument?docid=85
>     <https://documents.egi.eu/public/ShowDocument?docid=85>) i see a
>     problem at page 5 :
>     "VO Resource Managers and the Grid Operations personnel who have
>     access to the user-level accounting from more than one site."
>
>     "1. For the VOs to understand and control how many and which
>     individuals within the VO, group or role are using resources."
>     2. For VOs, Grid Management and Sites to report on anonymised and
>     aggregated statistics to their funding bodies.
>     3. For Grid Operations during operational troubleshooting and debugging.
>     4. For Grid Security Operations in forensic analysis of security
>     incidents. "
>
>     Point 1. : is VO only related.
>
>
> VO use the accounting portal to access the data, how are VOs supposed to
> access accounting data if this information is not provided to the
> repository?
hmm, i might hit a technical misunderstanding of mine here:
doesn't the VO have the only jobs submitter machine (WMS) for the 
respective VO? If so, the WMS can log directly the user DN and the 
associated job information that can lead to more detailed accounting.
It is in my opinion that all this over-sized and over complex 
information system of EMI(gLite) is not needed .. beside accounting info 
that a vo can gather from a site through some simple means, a site 
should not need to do such extensive information reporting.

>
>     Point 2. : have no relation to user-level info
>
>
> Not user level, but information to aggregate accounting information in a
> meaningful way are in the user DN. This, as specified by the policy,
> does not mean that user level accounting data will be disclosed.
>
>     Point 3. : i am not aware of specific user-level support
>     (troubleshooting and debugging) outside the VO ...
>
>
> The point says that accounting data could be used for this purpose,
> which means that they could be used by a very restricted set of people
> for critical testing.
>
>     Point 4. : this also should be done only at VO level. The VO should
>     be able (if it choose to) to record the user-level jobs sent. OTOH
>     the VO have also the submission mechanism so it has all the data
>     from start .. so why should the site record the same data?
>
>
> What you mean that VO has the data from the start? Does, for example,
> the "gridifin" VO has the accounting tools to provide user level
> accounting details to the EGI security team, in case of incident
> originated by that VO?
>   In case of a security incident, is very likely that the submission of
> jobs does not pass throught the usual VO submission frameworks, so it's
> likely that there are no accounting data available in the VOs accounting
> repositories, if any.
so, my above question about submission point is back again ... i had a 
brief encounter with GRID security incident handling at Gridka 2012 and 
it was in my opinion that most attacks wouldn't have been be possible if 
servers had been secured. Last exercise was with an attack that was a 
job lunched from an outside UI directly to my CREAM server .. i remember 
that i was very surprised then about this but i forgot as i had other 
things to do.
   So .. is it possible to send a job to a site with some VO 
credentials directly? well, that mean IMHO that EMI is deeply _broken_ 
from a security point of view!! a site should receive jobs ONLY from an 
authenticated submission server of the VO and no other! (and the UI part 
of job submission should connect only to this central(VO) submission 
mechanism)

>     Overall it is in my opinion that this is something to be done at VO
>     level and ONLY at VO level (both legal and technical) ..
>
>
> Not all the VOs are able to set up an accounting infrastructure, neither
if the VO cannot have an accounting infrastructure, you cannot ask of 
this from a contributing site .. you would but a big legal burden on 
their back (think about a scenario when a user say : "ok,my jobs were 
executed to you site. that is private information and i wanted deleted." 
and we would have to say : "you know is true that we acquired your data 
but we don't have it") it is about difference of legal entity between VO 
and a contributing site.

> should a site configure several different accounting frameworks if they
> are supporting multiple VOs with different accounting mechanisms.  For
> example I'm a VO Manager for the ops vo, and without this data I can't
> trace these information.
>
> The completeness of the accounting data is often crucial to make it
> meaningful and useful for VOs and NGIs. The EGI policies and technical
> solutions ensure that this data is not disclosed to entities not
> authorized to access them.
>
> EGI asks to sites part of the infrastructure to publish centrally the
> User DNs in order to provide a complete service to VOs and NGIs.
>
>
> Please, let me know if there are more questions.
Well, i am still not satisfied with this "centrally" and the submission 
mechanism should be fast repaired. The thing is that we are a small 
institute and we cannot afford any "potential" legal problems.
I will iterate the subject with my (senior) colleague from NIHAM and i 
will see how it goes ... until then i will put ticket on hold.
Also, i am sure that with some good will, all this information and 
reporting system can be made simpler, safer and flexible in its components.

Thank you for all your explanation!
Adrian


>
>
> Regards
>   Peter
>
> --
> Peter Solagna
> EGI.eu - Operations Manager
> email: [log in to unmask] <mailto:[log in to unmask]>
> skype: peter.solagna.egi


-- 
----------------------------------------------
Adrian Sevcenco                              |
Institute of Space Sciences - ISS, Romania   |
adrian.sevcenco at {cern.ch,spacescience.ro} |
----------------------------------------------


Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

March 2024
November 2023
June 2023
May 2023
April 2023
March 2023
February 2023
September 2022
June 2022
May 2022
April 2022
February 2022
December 2021
November 2021
October 2021
September 2021
July 2021
June 2021
May 2021
February 2021
January 2021
November 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
February 2018
January 2018
November 2017
October 2017
September 2017
July 2017
June 2017
May 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager