RSS

Holliday Greetings from OSG Operations

Dear OSG Collaborators,



OSG Operations would like to wish you a happy holiday season and joyous new year!



OSG Operations will continue to provide round the clock holiday coverage in case of operational emergencies over the holiday season. You can continue to open tickets at https://ticket.grid.iu.edu/goc/open, send us mail at goc@opensciencegrid.org, or call us at +1 (317)-274-9699. However, we will be operating on holiday procedures beginning on Tuesday the 24th and resuming regular operations on Thursday, January 2nd. During this time non-emergency issues will be handled on a best-effort basis.



Thanks to everyone for another successful year! We look forward to working with everyone in 2014!

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Emergency Release of OSG Software Versions 3.1.28 and 3.2.2

With the recent release of Enterprise Linux 6.5 (Red Hat, Scientific Linux,

CentOS), GRAM and GridFTP from the OSG Software Stack have stopped working

on those systems. Sites running version 6.4 will automatically update to

version 6.5 with a yum update. We are releasing updated Globus packages

that work around the problems. Sites running Enterprise Linux 6 are strongly

encouraged to update to the latest version of the OSG Software Stack, before

updating to version 6.5. Alternatively, sites can just update the Globus

packages from the OSG software repositories.



This addresses the OpenSSL issue previously reported at http://osggoc.blogspot.com/2013/12/openssl-101e-linked-to-gsi-failures.html



The updated packages are:

* globus-gatekeeper-9.6-1.12

* globus-xio-gsi-driver-8.1-4.1

* globus-gss-assist-2.1-4.1



Release notes and pointers to more documentation can be found at:

https://www.opensciencegrid.org/bin/view/Documentation/Release3/Release3128

https://www.opensciencegrid.org/bin/view/Documentation/Release3/Release322



Need help? Let us know:

https://www.opensciencegrid.org/bin/view/Documentation/Release3/HelpProcedure

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

Announcing OSG Software version 3.1.27 and 3.2.1

We are pleased to announce OSG Software versions 3.1.27 and 3.2.1!



Both 3.1.27 and 3.2.1 versions contain the following changes:



* Resolve install failures recently introduced by an OpenJDK update on EL6

* Add Cooperative Computing Lab's cctools (Parrot, Chirp, Makeflow, etc.)

* Update osg-info-services to version 1.0 with mostly minor bug fixes

* Update RSV with many small fixes

* Update CA packages to reflect IGTF 1.55

* Change grid-proxy-init and RSV to use 1024-bit RSA certificates



In addition, the 3.2.1 version contains the following change:



* Update glideinWMS to version 3.2.2



The OSG Software is distributed via RPMs for:



* Scientific Linux 5 and 6

* CentOS 5 and 6

* Red Hat Enterprise Linux 5 and 6



Release notes and pointers to more documentation can be found at:



https://www.opensciencegrid.org/bin/view/Documentation/Release3/Release3127

https://www.opensciencegrid.org/bin/view/Documentation/Release3/Release321



Need help? Let us know:



https://www.opensciencegrid.org/bin/view/Documentation/Release3/HelpProcedure



We welcome feedback on this release!

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS

OpenSSL 1.0.1e linked to GSI failures

In the last week or so, the RHEL 6, CentOS 6, Scientific Linux 6 (collectively, “EL6”) OS repositories have updated to the 6.5 release. One significant change is that OpenSSL was updated from version 1.0.0 to 1.0.1e. The OSG Software team has found that the Globus security layer (GSI) does not seem to work with this new OpenSSL release. Thus, common commands including globus-job-run and globus-url-copy fail. The failure occurs with the Globus Toolkit available from the OSG as well as the newer release available in EPEL.



The OSG team has not found the root cause of the problem yet and are still investigating. The Globus Toolkit team has been notified, as well. In the meantime, we suggest that OSG sites do NOT update to OpenSSL 1.0.1e, in case doing so causes site-wide authentication failures. The easiest way to avoid OpenSSL 1.0.1e is to avoid upgrading to version 6.5 of the operating system.



We will send out more information as soon as it is available.

  • Digg
  • Del.icio.us
  • StumbleUpon
  • Reddit
  • RSS