Ian,

I too am trying to learn the GSI authentication, and started with the 
QuickStart.  I was luckier than you in successfully setting up both a 1st 
machine (myproxy ticket server) and 2nd machine (generic node).   
Unfortunately, I have been balked at setting up a second myproxy ticket server 
(i.e 3rd machine).

Though not yet fully successful, I found “Installing GT 6.0: Basic Security 
Configuration” 
(http://toolkit.globus.org/toolkit/docs/latest-stable/admin/install/#gtadmin-basic-security)
 useful

If you have unprivileged accounts on two ticket server nodes (i.e. QuickStart 
1st machine with myproxy, gridftp, and gram) successfully transferring files, 
by gsiftp though a firewall, I would like to learn how you accomplished it.




myproxy-logon -b -s cygnus
    Error authenticating: GSS Major Status: Authentication Failed
    GSS Minor Status Error Chain:
    globus_gss_assist: Error during context initialization
    globus_gsi_gssapi: Unable to verify remote side's credentials
    globus_gsi_gssapi: SSLv3 handshake problems: Couldn't do ssl handshake
    OpenSSL Error: s3_pkt.c:1259: in library: SSL routines, function 
SSL3_READ_BYTES: tlsv1 alert unknown ca SSL alert number 48

I interpret this as indication that your local box (unidentified) was able to 
receive a handshake reply, with public host key, from Cygnus, but was 
subsequently unable to validate the host key supplied by Cygnus[1]. Alert 48 is 
X509_V_ERR_EXCLUDED_VIOLATION and/or TLS1_AD_UNKNOWN_CA [2].  This ssl 
handshake is I believe a prerequisite (gssapi) that must be satisfied before 
gsi authentication (myproxy) begins.

As something easy to check, I suggest that you first verify that your 
myproxy-server package successfully linked with openssl-1.0.1e or later.  If 
you installed from rpm repository, you should have been warned if your openssl 
was too old, but I don’t know if the binary tarball or some of the other 
installation methods would give you notice [3].

More likely, I suspect that your local host is missing a certificate authority 
public key or other means to validate Cygnus.  If this is the case, you should 
observe that a user’s first attempt to use ssh at the command line to login to 
Cygnus should fail, or request confirmation of Cygnus’ fingerprint.

To add a certificate authority public key (or self-signed host key), append the 
key to /etc/ssh/ssh_host_rsa_key-cert.pub, or the file named by HostCertificate 
in /etc/ssh/sshd_config .
See 
https://www.digitalocean.com/community/tutorials/how-to-create-an-ssh-ca-to-validate-hosts-and-clients-with-ubuntu
 for details.

Though I know this is a not a complete solution, unless someone else provides a 
more complete answer, I hope this is helpful.

[1] Imagine that someone came to your door, you asked to see id, and they 
presented a badge, but a badge from a company you were unfamiliar with.
[2] See /usr/include/openssl/{tls2,x509_vfy}.h in package openssl-devel
[3] Source tarball compiles and links without error with openssl-1.0.1, but 
globus-gridftp-server apparently dies immediately and without report on first 
communication attempt.

Hopefully helpful,
--
Bob

Dr. Robert Meier
Senior Application Specialist
Fiat Chrysler Automotive
       _______
   _/  I  \____\,
()-------()) ---- ))

Reply via email to