EP3192228A1 - Verfahren und vorrichtung zur überwachung der bereitstellung von authentifizierungszertifikaten an dienstknoten eines hochleistungsrechners - Google Patents

Verfahren und vorrichtung zur überwachung der bereitstellung von authentifizierungszertifikaten an dienstknoten eines hochleistungsrechners

Info

Publication number
EP3192228A1
EP3192228A1 EP15766912.8A EP15766912A EP3192228A1 EP 3192228 A1 EP3192228 A1 EP 3192228A1 EP 15766912 A EP15766912 A EP 15766912A EP 3192228 A1 EP3192228 A1 EP 3192228A1
Authority
EP
European Patent Office
Prior art keywords
service
service node
node
server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15766912.8A
Other languages
English (en)
French (fr)
Inventor
Julien GEORGES
Thierry Iceta
Emmanuel FLACARD
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bull SAS
Original Assignee
Bull SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull SAS filed Critical Bull SAS
Publication of EP3192228A1 publication Critical patent/EP3192228A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4416Network booting; Remote initial program loading [RIPL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • H04L61/5014Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the invention relates to "high performance" type computers (or supercomputers), and more specifically to the control of the provision of authentication certificates to service nodes that include such high performance computers.
  • One of these steps is to configure each of the service nodes with a configuration tool after an initialization phase.
  • This configuration step requires the authentication of each service node by at least one authentication certificate that has been previously installed in a specific location of a storage area of the service node considered.
  • Different methods for installing authentication certificates for a service node have been proposed. But these methods are generally all implemented once the service node is running, which adds an extra step when operating its supercomputer.
  • the purpose of the invention is notably to improve the situation, and in particular to allow the service nodes to authenticate with their server just after the end of the initialization phase.
  • a first step (i) in which one defines for each node of service a set of at least one authentication certificate, then integrating each set defined for a service node into a configuration file associated with an identifier of this service node,
  • each service node transmits to a predefined server a start request intended to retrieve its identifier and a command file containing the set included in the associated configuration file, and
  • each service node extracts from the command file the set it contains to store each authentication certificate it contains in an associated location in a corresponding storage area.
  • the method according to the invention may comprise other characteristics that can be taken separately or in combination, and in particular:
  • each set can be integrated in a configuration file of the "pxelinux.cfg" type;
  • each service node identifier may be an IP address
  • the first step (i) can be performed in the predefined server
  • each service node can extract from the recovered command file each authentication certificate in order to place it in an authentication certificate file (s).
  • the invention also proposes a computer program product comprising a set of instructions which, when executed by processing means, is adapted to implement a control method of the type of that presented above to control the provision of authentication certificates to nodes of service of a high performance calculator.
  • the invention also proposes a control device intended to equip a high performance computer comprising a server coupled to service nodes, and comprising:
  • first control means arranged to define for each service node a set of at least one authentication certificate, then to integrate each set defined for a service node into a configuration file associated with an identifier of this node of service. service, and, in case of reception of a start request sent by a service node, for generating a command file containing the set included in the configuration file associated with the identifier of this service node, and to trigger the transmission of this command file to the latter, and
  • second control means located in each of the service nodes and each arranged to extract from a transmitted command file the set it contains in order to store each authentication certificate of this extracted set in an associated location in a corresponding storage area of the relevant service node.
  • the invention also proposes a high performance computer comprising a server coupled to service nodes, and a control device of the type of that presented above.
  • the server may include the first control means.
  • FIG. 1 schematically and functionally illustrates a high performance computer equipped with an exemplary embodiment of a control device according to the invention
  • FIG. 2 illustrates an example of an algorithm implementing a method control system according to the invention.
  • the object of the invention is in particular to propose a control method, and an associated control device D, intended to allow the control of the provision of authentication certificates to service nodes Nij of a high performance computer CHP.
  • FIG. 1 diagrammatically illustrates a nonlimiting example of a high performance computer CHP comprising a server SC coupled to service nodes Ny, for example via a communication network (such as for example the Internet).
  • N is equal to 10 and M (i) is equal to 500 regardless of the group Gi considered (and therefore whatever the value of the index i).
  • the number of nodes Ny could vary from one group Gi to the other Gr.
  • the number N of groups Gi can take any value greater than or equal to one (1).
  • the number M (i) of nodes Ny of a group Gi can take any value greater than or equal to three (3).
  • Each node Ny has resources that are generally shared with the other nodes Ny (j ' ⁇ j) of its group Gi, under the control of a software of high availability (or HA ("High Availability")). These resources can be of any type as long as they are configurable services that are useful to the CHP calculator or to an application running in this CHP calculator.
  • the SC server provides several services related to the boot (or "boot”) network nodes Ny.
  • DHCP Dynamic Host Configuration Protocol
  • tftp and "boot pxe” services for the transfer of hexadecimal files with the variables necessary for the authentication of Ny nodes after the initialization phase and the transfer of the operating system image before be used by Ny nodes.
  • OC configuration tool intended to configure resources. N nodes.
  • the configuration tool OC is Kconf® (marketed by BULL SAS).
  • the invention proposes a method for enabling the control of the provision of authentication certificates to service nodes Ny of a high performance computer CHP.
  • This method comprises first (i), second (ii) and third (iii) steps, which can be implemented at least partially by a control device D according to the invention.
  • a control device D comprises at least first MC1 and second MC2 control means.
  • the second control means MC2 are installed in each of the service nodes Ny.
  • the first control means MC1 are installed in the server SC, and more precisely in the configuration tool OC. But this is not obligatory. They could indeed be equipment that is external to the SC server but accessible by the latter (SC), for example because of a computer connection, or that is part of the SC server but not its tool of OC configuration.
  • control device D can be realized, either in the form of software modules (or computer, or “software”); it is then in the presence of a computer program product comprising a set of instructions which, when executed by processing means such as electronic circuits (or “hardware”), is adapted to implement the method control system, either in the form of a combination of software modules and electronic circuits.
  • each set defined for a node Ny is integrated in a file of configuration associated with an identifier of the node Ny.
  • This first step (i) is performed by the first control means MC1, possibly under the control of a person authorized by the administrator of the CHP computer. It can be triggered automatically as part of a Ny node contact process for network boot, or manually at the initiative of the CHP supercomputer administrator.
  • This first step (i) is referenced in the exemplary algorithm of FIG.
  • Each set may include one, two, three, or four authentication certificates, or even more if needed.
  • the first control means MC1 may be arranged to generate each authentication certificate intended for a node Ny from information that is stored in a database BD of the server SC and that defines all the characteristics of the Ny nodes. This generation can be done by means of a first script.
  • the authentication certificates thus generated can be stored in the SC server as primary files in a predefined tree.
  • the authentication certificates of the nodes Ny are already generated and the first control means MC1 only retrieve them for storage in the server SC in the form of primary files in a predefined tree.
  • the first control means MC1 can be arranged to recover the contents of each primary file associated with a node Ny in order to format it and integrate it into a variable (s) of a file.
  • configuration associated with an identifier of the node Ny pre-existing and for example stored in first MS storage means of the SC server, such as a memory. It will be understood that each variable corresponds to an authentication certificate.
  • Each node identifier Ny is for example an address I P which is stored in the database BD among all the information defining this node Ny.
  • each configuration file can be of the type "pxelinux.cfg".
  • the associated configuration file can be "/tftpboot/pxelinux.cfg/OAOOOOOD", where 0A00000D is the name of the configuration file in hexadecimal form, which corresponds to the IP address of this node Ny in hexadecimal format.
  • This IP address of the node is defined by the DHCP service.
  • the contents of a file configuration is standard text that contains N node boot instructions over the network.
  • the integration of the values of the authentication certificate variables can be done by means of a second script of the first control means MC1.
  • each node Ny transmits to the predefined SC server a start request which is intended to retrieve its identifier (here its IP address) and a command file which contains the set of authentication certificates included in the associated configuration file (that is, containing its IP address).
  • This second step (ii) is referenced in the exemplary algorithm of FIG.
  • the administrator of the CHP supercomputer wishes to start the N nodes, he triggers the sending of start requests by these nodes Ny. For this purpose, it orders the Ny nodes to start (or boot) via the network. The sequence is done automatically for each node Ny by sending to the SC server a boot request preferably type "PXE network boot". This triggers a contact with the SC server by virtue of the IP address of the node Ny obtained via the DHCP service, then the recovery by this node Ny of its hexadecimal configuration file on the service pxe of the server SC, and obtaining by this Ny node of its SC operating system via tftp transfer service of the SC server.
  • a boot request preferably type "PXE network boot”.
  • the first control means MC1 On receipt of a start request transmitted by a node Ny, the first control means MC1 will determine in the storage means MS the configuration file which contains the address I P of this node Ny. Then, they will extract from this configuration file the value of each authentication certificate variable in order to integrate it into a command file, and finally they will order the server SC to transmit this command file to the requesting node Ny.
  • this command file can be of type "/ proc / cmdline".
  • each node Ny extracts from the command file that it has recovered (consecutively to sending its start request) the set of authentication certificate (s) it contains in order to store each authentication certificate it contains in an associated location in a corresponding storage area MS '.
  • This storage area MS ' is for example a memory of a node Nij which is used to store essential data throughout the operating phase of this node N.
  • This third step (iii) is referenced in the exemplary algorithm of FIG.
  • each node Nij which perform the extraction of the value of each authentication certificate variable, then convert each extracted value in a format understandable by its node Ny, and finally which place each value. converted to the associated location of the storage area MS '.
  • This place includes for example a predefined tree and at least one predefined file.
  • the second control means MC2 of a node Ny before they can extract from the command file retrieved each authentication certificate in order to place it ( after its possible conversion to the correct format) into an authentication certificate file (s).
  • the node Ny already comprises an original file of authentication certificate (s) when it receives a command file
  • its second control means MC2 can either store the original file in another predefined storage area and the new authentication certificate file (s) at the location where the original file was stored (ie in MS storage means), or simply replace (or overwrite) the original file with the new certificate file (s) ) authentication in the storage means MS '. In the absence of difference, it preserves the original file at the location where it is stored (namely in the storage means MS ').

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)
EP15766912.8A 2014-09-09 2015-09-02 Verfahren und vorrichtung zur überwachung der bereitstellung von authentifizierungszertifikaten an dienstknoten eines hochleistungsrechners Withdrawn EP3192228A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1458437A FR3025632B1 (fr) 2014-09-09 2014-09-09 Procede et dispositif de controle de la fourniture de certificats d'authentification a des nœuds de service d'un calculateur haute performance
PCT/FR2015/052321 WO2016038278A1 (fr) 2014-09-09 2015-09-02 Procédé et dispositif de contrôle de la fourniture de certificats d'authentification à des nœuds de service d'un calculateur haute performance

Publications (1)

Publication Number Publication Date
EP3192228A1 true EP3192228A1 (de) 2017-07-19

Family

ID=52450274

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15766912.8A Withdrawn EP3192228A1 (de) 2014-09-09 2015-09-02 Verfahren und vorrichtung zur überwachung der bereitstellung von authentifizierungszertifikaten an dienstknoten eines hochleistungsrechners

Country Status (4)

Country Link
US (1) US20170318056A1 (de)
EP (1) EP3192228A1 (de)
FR (1) FR3025632B1 (de)
WO (1) WO2016038278A1 (de)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11165766B2 (en) 2018-08-21 2021-11-02 International Business Machines Corporation Implementing authentication protocol for merging multiple server nodes with trusted platform modules utilizing provisioned node certificates to support concurrent node add and remove
US10885197B2 (en) * 2018-09-21 2021-01-05 International Business Machines Corporation Merging multiple compute nodes with trusted platform modules utilizing authentication protocol with active trusted platform module provisioning
US11206141B2 (en) 2018-09-21 2021-12-21 International Business Machines Corporation Merging multiple compute nodes with trusted platform modules utilizing provisioned node certificates

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6715075B1 (en) * 1999-07-08 2004-03-30 Intel Corporation Providing a configuration file to a communication device
US7430664B2 (en) * 2005-02-02 2008-09-30 Innomedia Pte, Ltd System and method for securely providing a configuration file over and open network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
None *
See also references of WO2016038278A1 *

Also Published As

Publication number Publication date
US20170318056A1 (en) 2017-11-02
FR3025632A1 (fr) 2016-03-11
FR3025632B1 (fr) 2016-11-04
WO2016038278A1 (fr) 2016-03-17

Similar Documents

Publication Publication Date Title
EP2449751B1 (de) Verfahren zum Starten eines Computers in einem Netzwerk, Server und Computernetzwerk zur Umsetzung des Verfahrens
US8719392B2 (en) Searching a managed network for setting and configuration data
EP1687717B1 (de) Gesichertes herauffahren einer elektronischen einrichtung mit smp-architektur
EP3108361A2 (de) Verfahren zum einsetzen eines satzes von softwareanwendungen
FR2855691A1 (fr) Securisation de la distribution de documents numeriques dans un reseau pair a pair
US20170034020A1 (en) System and method for monitoring bittorrent content and the computers that share bittorrent content
JP6785913B2 (ja) インターネット上での違法なコンテンツの配布を防止する方法及びシステム
EP3192228A1 (de) Verfahren und vorrichtung zur überwachung der bereitstellung von authentifizierungszertifikaten an dienstknoten eines hochleistungsrechners
EP2633440B1 (de) Indexierung und ausführen von softwareanwendungen in einem netzwerk
EP3714588B1 (de) Verfahren zur fernverwaltung einer an ein residential-gateway angeschlossenen vorrichtung
EP3906635A1 (de) Verfahren zur verbindung einer rechenanwendung mit einer sicheren computerressource
EP3394740B1 (de) Verfahren zur konfiguration eines betriebssystems
EP3623979A1 (de) Gesicherte speicherungsmethode in einem netzwerk eines container images in einer container registry
EP2912598A1 (de) Verfahren zum herunterladen von mindestens einer softwarekomponente auf eine computervorrichtung sowie zugehöriges computerprogrammprodukt, computervorrichtung und computersystem
EP2851793B1 (de) Verfahren zur konfiguration mindestens eines computerclusterknotens, entsprechende vorrichtung und entsprechendes system
FR2814020A1 (fr) Procede et dispositif de traitement d'un document electronique dans un reseau de communication
FR2906097A1 (fr) Procedes d'echange de donnees securises, produit programme d'ordinateur, moyen de stockage et dispositifs correspondants.
FR3001560A1 (fr) Deploiement d’images systemes doubles dans une grappe de serveurs
FR2911203A1 (fr) Procede de gestion de l'environnement d'execution sur des postes clients legers
FR2805905A1 (fr) Procede d'execution d'une action dans un systeme d'information heterogene
FR3040805A1 (fr) Procede automatique de mise en place et maintenance de services de haute disponibilite dans un systeme d'exploitation en nuage
FR2987534A1 (fr) Methode d'inventaire de reseau.
FR3001817A1 (fr) Procede de configuration d'une pluralite de nœuds d'une grappe d'ordinateur

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20170404

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20190220

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20190903