We have virtual organization spd. When I generate proxy on my local machine and try to upload data to EOS using root protocol everything works. But when I submit jobs to cloud, jobs cant submit data to EOS with error:
But when I go to a virtual machine, log in there as plt00 user, and set X509_USER_PROXY to point on /scratch/tmp?????? certificate I can not submit data with the same error. A check of the certificate does not show any issues:
So I checked proxy with openssl. The working one:
# openssl x509 -in /tmp/x509up_u1003 -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1889812439 (0x70a43fd7)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=RU, O=RDIG, OU=users, OU=jinr.ru, CN=Igor Pelevanyuk, CN=9908250618 Validity
Not Before: Jul 22 08:12:57 2021 GMT
Not After : Jul 23 08:11:57 2021 GMT
Subject: C=RU, O=RDIG, OU=users, OU=jinr.ru, CN=Igor Pelevanyuk, CN=9908250618, CN=1889812439 Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:a2:fb:86:cc:db:df:bf:11:07:9e:54:be:ff:e9:
a0:56:ab:57:83:04:46:9b:49:2c:b8:5f:a3:75:53:
e6:a7:50:fc:a1:51:14:8d:3e:45:cb:41:40:45:b9:
8a:c5:bb:d4:98:ab:d5:77:34:c7:c7:9f:51:eb:aa:
f6:09:85:b2:a5:68:7d:de:dd:70:a5:1b:f9:77:f8:
7b:da:5b:38:92:cb:cb:4e:fe:d8:0d:6f:0d:24:a0:
eb:71:ee:de:cf:10:93:1b:c3:ce:13:f8:b0:47:6c:
64:1c:a5:fe:7b:71:30:58:4f:c5:26:e1:ea:13:d3:
aa:6c:69:f1:f6:80:ff:5e:f9
Exponent: 65537 (0x10001)
X509v3 extensions:
1.3.6.1.4.1.8005.100.100.5:
0...U. 0...0...0...0......0d.b0\.Z0X1.0...U....RU1
0...U.1.0...U....users1.0...U....jinr.ru1.0...U....Igor Pelevanyuk..&..`0^.\0Z1.0...U....RU1
............sH..s.P .>.0"..20210722081757Z..20210723081157Z0i0g.r.ru0
+.....Edd.1Y0W.).'spd.nica.jinr://lcgvoms01.jinr.ru:150030*.(/spd.nica.jinr/Role=NULL/Capability=NULL0..50....
+.....Edd
0...U.E1.0...U....RU1......&.0
0...U.094113Z0Z1.0...U....RU1-Intensive Grid CA0..
..........0......hosts1.0...U....jinr.ru1.0...U....lcgvoms01.jinr.ru0.."0
.......rsj0....\u...P.$[.|#A.z.f..h.E.M.4.=.z...4...l...ld.uh.....n....o....EJ...P......+......bg.9*.%o.9........-....V...h.s..m.U...v..y#..b...?l..U(..(.t.-......*;t.. Z+...R......x....n..Bl1....}...0...../.me...E..>...G.}.2.T}l..H..~.O.....^!e8.
0...U..L..7.#.........0...0...U.......0.0...U...........0...`.H...B........0...U....0...lcgvoms01.jinr.ru0...U.......w1-f...$...:...7...0m..U.#.f0d.....}...a...!h.~`..pY.I.G0E1.0...U....RU1
............:##.X)..e.U..Jk.^...@... ..+F9.]2@.(-..W!..Dqy.!.o.......pYn1...............K.'.../.'.+x.u.N...a.H,.7..C.....7.u .w.......&.".......#=f:#.....2@.{.F...I#..<.l.......O..[/6.V^3...!..:....b...&...p^[.L..H.\}......e.=..........\...S=.........F, ....@mE..S..v.w^..%I...wE.QHz..9.z......7. \. `?..{9vB.F...3}~.>....X`H..>W..#.l0..+32n..
X509v3 Key Usage: critical
Digital Signature, Key Encipherment, Data Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Authority Key Identifier:
0.
Proxy Certificate Information: critical
Path Length Constraint: infinite
Policy Language: Inherit all
Signature Algorithm: sha256WithRSAEncryption
80:cb:98:a9:fb:9a:c7:00:5b:9d:e4:e4:a9:ec:57:d6:8f:93:
13:b6:40:5e:20:59:00:ed:07:d0:70:5e:ea:a7:f8:32:fc:fe:
f2:9b:e8:56:a0:1e:e8:25:7a:0c:08:78:e5:60:64:2f:73:8e:
be:6c:11:3a:4b:18:8e:8c:01:45:ec:dd:66:b6:15:58:64:3c:
14:27:66:81:65:d9:ca:c3:d0:9d:81:ba:06:0b:da:c0:fd:00:
b7:7e:b2:05:07:d3:03:cc:02:41:66:bf:b4:b6:a9:7a:f4:b7:
f2:ce:a3:0d:bb:39:c9:7e:29:47:53:26:14:7c:17:a6:65:6f:
68:fe
# openssl x509 -in /scratch/tmpShQVww -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
38:33:36:30:39:39:38:39:35:32
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=RU, O=RDIG, OU=users, OU=
jinr.ru, CN=Igor Pelevanyuk, CN=743984388, CN=2749424050
Validity
Not Before: Jul 22 07:05:59 2021 GMT
Not After : Jul 23 07:20:58 2021 GMT
Subject: C=RU, O=RDIG, OU=users, OU=
jinr.ru, CN=Igor Pelevanyuk, CN=743984388, CN=2749424050, CN=33566894
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (1024 bit)
Modulus:
00:9c:f6:7a:e6:d2:92:fa:f4:ba:af:6d:03:da:9a:
93:6c:e5:67:b9:1f:83:46:46:a0:63:aa:fe:fb:9e:
a3:08:17:98:bd:08:bd:cc:4e:76:c5:3c:7f:e3:f5:
32:04:d8:9a:a2:2d:f0:de:e3:3a:46:6f:48:3e:90:
21:f3:03:cb:ae:d0:ba:c3:ba:12:ce:79:04:1e:f7:
37:55:db:67:66:a9:67:34:cd:c6:c7:67:83:42:7c:
93:bc:16:46:4b:8c:70:c0:b4:1b:94:a4:54:d4:a5:
95:2d:63:b6:3d:60:19:e9:3e:a9:1e:d7:e3:02:a5:
e5:cc:5c:af:9b:5f:58:3a:85
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment, Data Encipherment
Proxy Certificate Information: critical
Path Length Constraint: infinite
Policy Language: Inherit all
Signature Algorithm: sha256WithRSAEncryption
33:ae:a9:d5:5c:7a:26:6c:37:56:34:d9:26:ce:27:82:4a:83:
bf:c9:e1:f0:fb:c2:f3:38:72:66:c7:56:96:75:f6:c9:dd:b9:
3e:95:f8:94:60:ed:4c:6b:d2:42:56:3f:7f:ab:41:30:4e:9b:
35:9f:e7:54:54:bd:ee:68:11:f6:4d:4b:21:ef:ee:f0:65:39:
c4:d7:e6:5f:a9:2f:63:79:da:a0:4a:69:76:2d:f8:f9:74:0a:
2e:25:77:0a:56:4b:20:4e:23:17:42:f6:47:c7:a9:5f:a7:19:
27:2c:f6:0f:6a:57:b4:71:f8:52:24:98:85:8b:39:15:08:21:
42:87
I am not a specialist in x509 certificates, but these outputs look different for me. For dirac-proxy-info and voms-proxy-info they are the same.
Can you point to me what component is responsible for generating proxy on clouds? Maybe someone saw the same behavior?
Kind regards,
Igor Pelevanyuk