Am 18.05.2012 um 15:41 schrieb Rayson Ho: > On Fri, May 18, 2012 at 4:27 AM, Beat Rubischon <b...@0x1b.ch> wrote: >> On 17.05.12 18:51, Rayson Ho wrote: >>> Just want to understand your use case, what is the main reason you use >>> the CSP mode?? >> >> Security. The queuemaster fully trusts the username sent by the client >> binaries over the wire. > > That's the main reason people switch on CSP mode, I guess. But there > are other features in CSP mode that are not available in MUNGE or the > privileged port mode - eg. encrypted daemon communication, and > blocking all users without certificates from accessing Grid Engine. > > Torque uses the privileged port method, and I think Grid Engine should > add back the support for it as it is the most straightforward way of > authentication - it is well understood & easy to setup. > > If you have access to to the physical wire, then both MUNGE and > privileged ports are not good enough, as one can replay the network > packets or create a new packet by hand (I played with MUNGE before and > there's the timeout mechanism, however, it is not a one-time > password). You really need the public/private key protocol in CSP mode > to avoid this attack. > > Finally, blocking users without certificates from accessing Grid > Engine is really important as well. A site asked about the CSP mode > not because of the authentication of UID it provides, but only to use > it to block all users without a valid certificate from using Grid > Engine.
To use or access SGE? To avoid job submissions one could create an ACL and use it in the SGE configuration to avoid job submissions by not entitled users in (x)user_lists, nevertheless they can issue `qstat` or alike. -- Reuti _______________________________________________ users mailing list users@gridengine.org https://gridengine.org/mailman/listinfo/users