INFSO-RI-508833 Enabling Grids for E-sciencE NPM Security Alistair K Phipps (NeSC) JRA4 Face To Face, CERN, Geneva.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
A responsibility based model EDG CA Managers Meeting June 13, 2003.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
E-science grid facility for Europe and Latin America A Data Access Policy based on VOMS attributes in the Secure Storage Service Diego Scardaci.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Connect. Communicate. Collaborate The Technological Landscape of GÉANT2 Roberto Sabatino, DANTE
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Basics for the User Guy Warner NeSC Training Team An Induction to EGEE for GOSC.
GN2 Performance Monitoring & Management : AA Needs – Nicolas Simar - 2 nd AA Workshop Nov 2003 Malaga, Spain GN2 Performance Monitoring & Management.
ANSTO E-Science workshop Romain Quilici University of Sydney CIMA CIMA Instrument Remote Control Instrument Remote Control Integration with GridSphere.
INFSO-RI Enabling Grids for E-sciencE Federated Network Performance Monitoring for the Grid K. Kavoussanakis, EPCC, The University.
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
INFSO-RI Enabling Grids for E-sciencE Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 21 Distributed System Security Copyright © 2008.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Military Technical Academy Bucharest, 2004 GETTING ACCESS TO THE GRID Authentication, Authorization and Delegation ADINA RIPOSAN Applied Information Technology.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
3-Nov-00D.P.Kelsey, HEPiX, JLAB1 Certificates for DataGRID David Kelsey CLRC/RAL, UK
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
INFSO-RI Enabling Grids for E-sciencE EGEE is a project funded by the European Union under contract INFSO-RI Grid Accounting.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks PASSTORE: safe certs & password management.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Using GStat 2.0 for Information Validation.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Update on Network Performance Monitoring.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
INFSO-RI Enabling Grids for E-sciencE NRENs & Grids Workshop Relations between EGEE & NRENs Mathieu Goutelle (CNRS UREC) EGEE-SA2.
INFSO-RI Enabling Grids for E-sciencE Policy management and fair share in gLite Andrea Guarise HPDC 2006 Paris June 19th, 2006.
INFSO-RI Enabling Grids for E-sciencE NPM Mediator JRA4 F2F, Edinburgh, July 2005 Alistair K Phipps University.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks LHCOPN Operational model: Roles and functions.
EGEE-II INFSO-RI Enabling Grids for E-sciencE More on gLite: 2 services you have not seen! Mike Mineter.
INFSO-RI Enabling Grids for E-sciencE Network Services Development Network Resource Provision 3 rd EGEE Conference, Athens, 20 th.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid is a Bazaar of Resource Providers and.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Dashboard for Operations Cyril L’Orphelin.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
INFSO-RI Enabling Grids for E-sciencE Padova site report Massimo Sgaravatto On behalf of the JRA1 IT-CZ Padova group.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Emidio Giorgio INFN Catania.
INFSO-RI Enabling Grids for E-sciencE JRA3 Åke Edlund On behalf of JRA3 EGEE 8th All-activity meeting January 18-19,
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Enabling Grids for E-sciencE Claudio Cherubino INFN DGAS (Distributed Grid Accounting System)
EGEE is a project funded by the European Union under contract INFSO-RI DGAS Grid accounting L.Gaido on behalf of A.Guarise LCG Workshop November.
Virtual Organisations and the NGS Mike Jones Research Computing Services e-Science & “The Grid” for Bio/Health Informaticians, IT January 2008.
INFSO-RI Enabling Grids for E-sciencE Security needs in the Medical Data Manager EGEE MWSG, March 7-8 th, 2006 Ákos Frohner on behalf.
INFSO-RI Enabling Grids for E-sciencE TNC 2005 Networking activities in EGEE Mathieu Goutelle (CNRS UREC, France) EGEE-SA2 activity.
CONNECTING TO THE INTERNET
Active Directory Administration
X-Road as a Platform to Exchange MyData
AbbottLink™ - IP Address Overview
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE NPM Security Alistair K Phipps (NeSC) JRA4 Face To Face, CERN, Geneva. 7 Feb 2005.

Enabling Grids for E-sciencE INFSO-RI Why security? Network monitoring sites need to restrict access to their data to a known set of users to: –Restrict loading on services –Protect commercially sensitive information –Prevent release of information that could be used to attack network

Enabling Grids for E-sciencE INFSO-RI NPM Mediator NPM Mediator retrieves network monitoring information from Network Monitoring Points (NM Points) at the request of clients End Site EDG WP7 NM-WG Backbone Perfmonit NM-WG End Site Home grown NM-WG Backbone piPEs NM-WG Backbone GN2 NM-WG JRA4 NPM Mediator NM-WG Diagnostic Client GOC/NOC

Enabling Grids for E-sciencE INFSO-RI Mediator Security NM Points authorise users, not Mediators But Mediators must get access to information returned from NM Points (for aggregation and caching) so cannot use Client-NM Point end-to-end security Need a security solution both between Client and Mediator, and between Mediator and NM Point Require: –Encryption and integrity protection of data so it cannot be intercepted or changed en-route –Authentication of NM Point by Mediator to ensure communication is not being intercepted (man-in-the-middle attack) –Authentication of Mediator by Client for same reason May desire mutual authentication for logging/audit purposes This security can be provided by use X.509 certificates with appropriate Distinguished Name for the entities involved Issues with appropriate CAs to be resolved, especially for NOCs that are not GOCs

Enabling Grids for E-sciencE INFSO-RI Client-Mediator Security Does Mediator check user authorisation or defer checking to NM Points? –If authorisation deferred to NM Points, DoS attack on Mediator is multiplied into DoS attack on multiple NM Points unless requests from a particular client are throttled (DDoS issues?) –If authorisation done in Mediator (as well as NM Points), is the overhead of doing this checking multiple times significant? Is the list of users different from the list accepted by the NM points? Is some kind of user mapping needed? Are Mediators, NM Points divided into logical domains? –User could have authority to access Mediators and NM Points in particular domains –Authority granted in form of a certificate including user’s DN and authorised domains, signed by a trusted entity (CA) –User provides certificate along with request –Mediator checks client authorised for the domain it (mediator) lies within, and if so passes requests on to required NM points, as long as they also lie within domains for which the user is authorised

Enabling Grids for E-sciencE INFSO-RI Mediator-NM Point Security How does NM Point get information on user credentials? –Are there separate user lists for Mediator and each NM Point? –Does user give a time-limited Proxy certificate (or equivalent) to the Mediator to allow it to act on its behalf when contacting NM Points? How does discovery of NM Points operate? –If Mediators use Discovery to get information from NM points with no prior relationship, then NM Points must allow any Mediator to connect

Enabling Grids for E-sciencE INFSO-RI NPM Publisher NPM Publisher has knowledge of a number of end-site NM Points from which data is periodically collected and published into the gLite GIS

Enabling Grids for E-sciencE INFSO-RI Publisher Security Security must be maintained between: –Publisher and the GIS to provide reliable and secure information to gLite –NM Points and Publisher so that only end-site points wishing to publish information to gLite can do so –Between Publisher’s registry and NM points so only valid monitoring points can be registered to provide information to gLite

Enabling Grids for E-sciencE INFSO-RI Publisher-GIS Security Publisher interacts with GIS via standard gLite mechanisms Security specified by JRA1 and need not be considered further here

Enabling Grids for E-sciencE INFSO-RI NM Point-Publisher Security NM Points must verify that Publisher is authorised to access their data Publisher must be authenticated by NM Point –X.509 certificate with appropriate DN? NM Points must check Publisher’s authorisation –Publisher presents credential signed by entity NM Point trusts (NM Point operator)? –Or NM Point could have access to list of authorised Publisher users (viable for EGEE as small number of Publishers)

Enabling Grids for E-sciencE INFSO-RI Publisher Registry-NM Point Security Only valid NM Points must be inserted into Publisher’s registry Current registry is a static list of NM Points entered manually, so security is not an issue (apart from protecting this file from unauthorised modification) Dynamic registration will require a security scheme –Who controls Publisher and allows additions to registry? –Check NM Point will allow Publisher access before adding it to registry? –What about stale entries? Automatic cleanup?

Enabling Grids for E-sciencE INFSO-RI Conclusion Security has a 2-way effect: –Security issues affect implementation (e.g. method of discovery) –Implementation affects security (e.g. splitting of users into domains) Many unanswered questions about NPM security, mostly due to unanswered questions about NPM functionality But security must be considered throughout May be helpful to ask JRA3 specific questions as they come up (NPM Security discussion to follow)