Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

ANTHONY TIRADANI AND THE GLIDEINWMS TEAM glideinWMS in the Cloud.
HEPiX Virtualisation Working Group Status, July 9 th 2010
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
WLCG Cloud Traceability Working Group progress Ian Collier Pre-GDB Amsterdam 10th March 2015.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Maintaining and Updating Windows Server 2008
1 Bridging Clouds with CernVM: ATLAS/PanDA example Wenjing Wu
Tier-1 experience with provisioning virtualised worker nodes on demand Andrew Lahiff, Ian Collier STFC Rutherford Appleton Laboratory, Harwell Oxford,
EMI INFSO-RI Cloud Task Force Eric Yen and Simon Lin 22 Nov
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
David Groep Nikhef Amsterdam PDP & Grid Traceability in the face of Clouds EGI-GEANT Symposium – cloud security track With grateful thanks for the input.
Dynamic Firewalls and Service Deployment Models for Grid Environments Gian Luca Volpato, Christian Grimm RRZN – Leibniz Universität Hannover Cracow Grid.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
1 Evolution of OSG to support virtualization and multi-core applications (Perspective of a Condor Guy) Dan Bradley University of Wisconsin Workshop on.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks C. Loomis (CNRS/LAL) M.-E. Bégin (SixSq.
G RID M IDDLEWARE AND S ECURITY Suchandra Thapa Computation Institute University of Chicago.
High Performance File System Service for Cloud Computing Kenji Kobayashi, Osamu Tatebe University of Tsukuba, JAPAN.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud F2F Security Issues in the cloud Introduction Linda Cornwall,
Advanced Topics StratusLab Tutorial (Orsay, France) 28 November 2012.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
WLCG Cloud Traceability Working Group face to face report Ian Collier 11 February 2015.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Virtual Workspaces Kate Keahey Argonne National Laboratory.
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
Automating Operational and Management Tasks in Microsoft Operations Management Suite and Azure
Virtualised Worker Nodes Where are we? What next? Tony Cass GDB /12/12.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
Conference name Company name INFSOM-RI Speaker name The ETICS Job management architecture EGEE ‘08 Istanbul, September 25 th 2008 Valerio Venturi.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
GLIDEINWMS - PARAG MHASHILKAR Department Meeting, August 07, 2013.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
WLCG Overview Board, September 3 rd 2010 P. Mato, P.Buncic Use of multi-core and virtualization technologies.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Grid and Cloud Computing Alessandro Usai SWITCH Sergio Maffioletti Grid Computing Competence Centre - UZH/GC3
The SEE-GRID-SCI initiative is co-funded by the European Commission under the FP7 Research Infrastructures contract no Workflow repository, user.
Workload management, virtualisation, clouds & multicore Andrew Lahiff.
DIRAC Pilot Jobs A. Casajus, R. Graciani, A. Tsaregorodtsev for the LHCb DIRAC team Pilot Framework and the DIRAC WMS DIRAC Workload Management System.
HEPiX Virtualisation Working Group Status, February 10 th 2010 April 21 st 2010.
HEPiX Virtualisation Working Group Status, February 10 th 2010 April 21 st 2010 May 12 th 2010.
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Draft Security Virtualisation Policy (for Romain Wartel – CERN) EGI Technical.
Ian Collier, STFC, Romain Wartel, CERN Maintaining Traceability in an Evolving Distributed Computing Environment Introduction Security.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
Claudio Grandi INFN Bologna Virtual Pools for Interactive Analysis and Software Development through an Integrated Cloud Environment Claudio Grandi (INFN.
INFN/IGI contributions Federated Clouds Task Force F2F meeting November 24, 2011, Amsterdam.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
WP5 – Infrastructure Operations Test and Production Infrastructures StratusLab kick-off meeting June 2010, Orsay, France GRNET.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
The HEPiX Virtualisation Working Group Towards a Grid of Clouds Tony Cass CHEP 2012 May 24 th 2012.
Virtual Machines on BiG Grid INFN Annual Meeting May 2010 Sander Klous, Nikhef.
HEPiX Virtualisation working group Andrea Chierici INFN-CNAF Workshop CCR 2010.
@3 rd DPLTA CERN 7 December 2009 by Homer Neal ( ) BaBar Computing rd DPLTA CERN 7 December 2009 by Homer Neal ( )
Virtual Organisations and the NGS Mike Jones Research Computing Services e-Science & “The Grid” for Bio/Health Informaticians, IT January 2008.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SVG F2F Virtual Machines VM images, software run on VMS. 3 rd March 2015.
C Loomis (CNRS/LAL) and V. Floros (GRNET)
Cloud Challenges C. Loomis (CNRS/LAL) EGI-TF (Amsterdam)
HEPiX Virtualisation working group
ATLAS Cloud Operations
StratusLab Tutorial (Bordeaux, France)
Network Requirements Javier Orellana
WLCG Collaboration Workshop;
Free Exam Questions | New Microsoft Exam Dumps and Exam News
Presentation transcript:

Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011

CERN.ch Where’s the Problem?  Amazon EC2 (and similar services) allow users to create random images for instantiation on Amazon owned hardware. Why can’t HEP sites allow this? –Paranoia –Insufficient isolation of virtualisation service hardware »NFS and other systems using simple uid/gid access protection are vulnerable if end-users have root access. –Traceability and Logging requirements »Grid sites are required to maintain a trace of job/system activities for 6 months. (process accounting, syslog, …). »Why doesn’t Amazon need this?  T&C say you are responsible for the VM actions—so no multi-user pilot jobs…  They have your credit card details---unlike Grid sites where there may be no direct contract between someone submitting a job and the site at which it runs.  Amazon probably can link suspicious activity to a VM image instantiation. 2

CERN.ch Is there really a Problem?  Does it matter if user supplied virtual images are run in a “De-Militarised Zone” which protects the rest of the site from these images?  Virtual machine images must have the same level of access (bandwidth…) to key Grid services—notably to the mass storage system. –This is often not the case. “Real” worker nodes have better connections to storage and other services than ring-fenced virtual images. This is not acceptable. 3

CERN.ch The HEPiX Solution Trusted Virtual Machine Images  These require –A “contract” between image providers and sites where the are instantiated. –“Hooks” in the virtual machine image enabling sites to contextualise images to meet local site policies. –Multi-hypervisor support –The ability for end-users to request instantiation of a specific image for their work. 4

CERN.ch The HEPiX Solution Trusted Virtual Machine Images  These require –A “contract” between image providers and sites where the are instantiated. »Sites decide whether or not an image provider can be trusted to respect the “contract” when generating images. If the sites do trust an image provider then there is no need to verify the individual images. There is some overhead, but this is a one-time process and will concern a small number of people. –“Hooks” in the virtual machine image enabling sites to contextualise images to meet local site policies. –Multi-hypervisor support –The ability for end-users to request instantiation of a specific image for their work. 5

CERN.ch Policy for Trusted Image Generation  You recognise that VM base images, VO environments and VM complete images, must be generated according to current best practice, the details of which may be documented elsewhere by the Grid. These include but are not limited to: –any image generation tool used must be fully patched and up to date; –all operating system security patches must be applied to all images and be up to date; –images are assumed to be world-readable and as such must not contain any confidential information; –there should be no installed accounts, host/service certificates, ssh keys or user credentials of any form in an image; –images must be configured such that they do not prevent Sites from meeting the fine-grained monitoring and control requirements defined in the Grid Security Traceability and Logging policy to allow for security incident response; –the image must not prevent Sites from implementing local authorisation and/or policy decisions, e.g. blocking the running of Grid work for a particular user.  6

CERN.ch Trusted Images 7 Image courtesy of Romain Wartel

CERN.ch The HEPiX Solution Trusted Virtual Machine Images  These require –A “contract” between image providers and sites where the are instantiated. –“Hooks” in the virtual machine image enabling sites to contextualise images to meet local site policies. –Multi-hypervisor support –The ability for end-users to request instantiation of a specific image for their work. 8

CERN.ch Image Contextualisation  Contextualisation is needed so that sites can configure images to interface to local infrastructure – e.g. for syslog, monitoring & batch scheduler.  Contextualisation is limited to these needs! Sites may not alter the image contents in any way. –Any site are concerned about security aspects of an image should refuse to instantiate it and notify the endorser.  Contextualisation mechanism –Images should attempt to mount a CDROM image provided by the sites and, if successful, invoke two scripts from the CDROM image: »prolog.sh before network initialisation »epilog.sh after network initialisation 9

CERN.ch The HEPiX Solution Trusted Virtual Machine Images  These require –A “contract” between image providers and sites where the are instantiated. –“Hooks” in the virtual machine image enabling sites to contextualise images to meet local site policies. –Multi-hypervisor support »Xen/kvm compatibility demonstrated, but this has become less important as kvm becomes more dominant as a hypervisor (at least for compute node virtualisation). –The ability for end-users to request instantiation of a specific image for their work. 10

CERN.ch The HEPiX Solution Trusted Virtual Machine Images  These require –A “contract” between image providers and sites where the are instantiated. –“Hooks” in the virtual machine image enabling sites to contextualise images to meet local site policies. –Multi-hypervisor support –The ability for end-users to request instantiation of a specific image for their work. »Still a work-in-progress; the group is currently working on how newly created images can be advertised to sites and users and how these are requested. »One option being investigated is the StratusLab Marketplace. 11

CERN.ch A step towards Cloud Computing?  Most (all?) current implementations of virtualised cpu servers integrate virtual machines with local workload management systems –requests to the local WMS lead to instantiation of virtual machines –locally provided machines have WMS client installed; contextualisation allows WMS client installation for remotely provided images.  There is an alternative! –Sites can instantiate VM images that connect directly to a VOs pilot job infrastructure. –This decouples completely »Site role to allocate resources according to funding »VO interest in managing priorities between different users and tasks. –Dynamic instantiation of VM images according to demand patterns leads to changing “virtual batch system” for the VOs. 12

CERN.ch Summary  The HEPiX Virtualisation Working Group has established a framework which should enable the free interchange of virtual machine images between HEP sites –a policy governing how images should be generated, to enable trust between sites and endorsers, and –a mechanism for contextualising images to be compliant with local policies at the instantiating site, and –a mechanism for cataloguing endorsed images and to track images approved for instantiation at a given site  VO supplied images could connect to pilot job infrastructure directly, not the local workload management system –allowing sites to instantiate images dynamically according to workload patterns, a step towards Cloud Computing for HEP. 13