-
Notifications
You must be signed in to change notification settings - Fork 13
Description
I have Xrootd server installed with multiuser plugin installed.
Seems like multiuser is denying system user and showing the user does not exists.
XRootD Log :
251022 16:30:50 210548 cryptossl_X509::CertType: certificate has 2 extensions
251022 16:30:50 210548 cryptossl_X509::CertType: Found RFC 382{0,1}compliant proxyCertInfo extension
251022 16:30:50 210548 cryptossl_X509::CertType: certificate has 10 extensions
251022 16:30:50 210548 XrootdBridge: almalinu.1:33@nat-243-cc-130-179-243-136.umanitoba.ca login as almalinux
251022 16:30:50 210548 multiuser_UserSentry: Multiuser denying access: XRootD mapped request to username that does not exist: almalinux
251022 16:30:50 210548 multiuser_UserSentry: Multiuser denying access: XRootD mapped request to username that does not exist: almalinux
251022 16:30:50 210548 ofs_stat: almalinu.1:33@nat-243-cc-130-179-243-136.umanitoba.ca Unable to locate /rucio/test/53/47/xrootd-new4; permission denied
251022 16:30:50 210548 XrootdXeq: almalinu.1:33@nat-243-cc-130-179-243-136.umanitoba.ca disc 0:00:01 (send failure)
251022 16:30:50 210548 multiuser_UserSentry: Anonymous client; no user set, cannot change FS UIDs
251022 16:30:50 210565 cryptossl_X509::CertType: certificate has 2 extensions
251022 16:30:50 210565 cryptossl_X509::CertType: Found RFC 382{0,1}compliant proxyCertInfo extension
251022 16:30:50 210565 cryptossl_X509::CertType: certificate has 10 extensions
251022 16:30:50 210565 XrootdBridge: almalinu.2:36@nat-243-cc-130-179-243-136.umanitoba.ca login as almalinux
251022 16:30:50 210565 multiuser_UserSentry: Multiuser denying access: XRootD mapped request to username that does not exist: almalinux
251022 16:30:50 210565 multiuser_UserSentry: Multiuser denying access: XRootD mapped request to username that does not exist: almalinux
251022 16:30:50 210565 ofs_stat: almalinu.2:36@nat-243-cc-130-179-243-136.umanitoba.ca Unable to locate /rucio/test/53/47/xrootd-new4; permission denied
251022 16:30:50 210565 XrootdXeq: almalinu.2:36@nat-243-cc-130-179-243-136.umanitoba.ca disc 0:00:00 (send failure)
251022 16:30:50 210565 multiuser_UserSentry: Anonymous client; no user set, cannot change FS UIDs
My Mapfile :
[root@grigory-alma9 etc]# cat /etc/grid-security/grid-mapfile
"/C=CA/O=Grid/CN=rucio-test.hpc.umanitoba.ca" almalinux
Authfile :
[root@grigory-alma9 etc]# cat xrootd/Authfile
Allow full access to /rucio for the mapped xrootd user
u anon.* /rucio a
u almalinux /rucio a
I am not sure why multiuser plugin is denying local user.
[almalinux@grigory-alma9 ~]$ id -u
1000
How is the UID resolved? Is it using the traditional /etc/password setup or something more complex (e.g., sssd)?
Its just simple /etc/passwd user.
Is xrootd running in a container that may not be able to resolve the UID?
Xrootd running as service not container.
Service name is : xrootd-privileged@.service
[root@grigory-alma9 build]# cat /usr/lib/systemd/system/xrootd-privileged@.service
[Unit]
Description=XRootD xrootd daemon instance %I
Documentation=man:xrootd(8)
Documentation=https://xrootd.org/docs.html
Requires=network-online.target
After=network-online.target
[Service]
Note "-R xrootd" here instructs xrootd to drop privileges to the xrootd Unix user.
ExecStart=/usr/bin/xrootd -l /var/log/xrootd/xrootd.log -c /etc/xrootd/xrootd-%i.cfg -k fifo -s /var/run/xrootd/xrootd-%i.pid -n %i -R xrootd
Environment=XC_ENABLE_MULTIUSER=1
Type=simple
Restart=on-abort
RestartSec=0
KillMode=control-group
LimitNOFILE=65536
WorkingDirectory=/var/spool/xrootd
These provide xrootd with the ability to switch UIDs/GIDs for reading/writing files.
CapabilityBoundingSet=CAP_SETUID CAP_SETGID CAP_DAC_OVERRIDE
Capabilities=CAP_SETGID+p CAP_SETUID+p
[Install]
RequiredBy=multi-user.target
[root@grigory-alma9 build]#
Please help on the issue.
Best Regards
Kamrul Shaker