Www.egi.eu EGI-InSPIRE RI-261323 EGI-InSPIRE www.egi.eu EGI-InSPIRE RI-261323 Introduction of SHA-2 in the EGI Infrastructure David Groep, EGI-IGTF Liaison.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
IGTF and SHA-2 David Kelsey TAGPMA meeting, SDSC Feb 2012.
1 Some Current Thinking on Hash Functions Within NIST John Kelsey, NIST, June 2005.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
WLCG Security TEG, risks and Identity Management David Kelsey GridPP28, Manchester 18 Apr 2012.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Unified Middleware Distribution (UMD): SW provisioning to EGI Mario David.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Future support of EGI services Tiziana Ferrari/EGI.eu Future support of EGI.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EG recent developments T. Ferrari/EGI.eu ADC Weekly Meeting 15/05/
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
EUGridPMA CAOPS-WG and IGTF Issues June 2012 Delft, NL David Groep, Nikhef, EUGridPMA, EGI and BiG Grid.
Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL.
Blueprint Meeting Notes Feb 20, Feb 17, 2009 Authentication Infrastrusture Federation = {Institutes} U {CA} where both entities can be empty TODO1:
DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT By Alexander Beck Jens Graupmann Frank Ortmeier.
G RID M IDDLEWARE AND S ECURITY Suchandra Thapa Computation Institute University of Chicago.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
EUGridPMA Status, current trends and some technical topics March 2013 Boulder, CO, USA David Groep, Nikhef & EUGridPMA.
Rob Quick OSG Operations Area Coordinator Manager High Throughput Computing Indiana University Integrating OSG Operational Services Rob Quick OSG Operations.
Slide 1 August CSF NEbraskaCERT Certificate Authority Matthew G. Marsh 08/20/03.
Evolution of Grid Projects and what that means for WLCG Ian Bird, CERN WLCG Workshop, New York 19 th May 2012.
RI EGI-InSPIRE RI EGI Future activities Peter Solagna – EGI.eu.
European Grid Policy Management Authority. Event - 2/total Speaker Name – Coverage of the EUGridPMA Green: Countries with an accredited.
SHA-2, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
EGI-InSPIRE RI EGI.eu European Grid Infrastructure EGI-InSPIRE RI Credential Validation Middleware Requests compiling.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Threat Risk Assessment Dr Linda Cornwall Rutherford Appleton.
LCG Introduction John Gordon, STFC GDB December14 th 2011.
Status review and pending issues March 13, 2012 Oxford, UK David Groep, Nikhef, EUGridPMA, EGI and BiG Grid participation supported by IGE, the Initiative.
11-Dec-00D.P.Kelsey, Certificates, WP6 meeting, Milan1 Certificates for DataGrid Testbed0 David Kelsey CLRC/RAL, UK
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 02/13/2012.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
RI EGI-InSPIRE RI UMD 2 Decommissioning Status Cristina Aiftimiei EGI.eu.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay, James Basney,
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
EUGridPMA Status Review … and proposals February 28, 2012 Taipei, TW David Groep, Nikhef, EUGridPMA, EGI and BiG Grid.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Storage Accounting John Gordon, STFC OMB August 2013.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Status of ARGUS support Peter Solagna – EGI.eu.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
The Americas Grid Policy Management Authority TAGPMA Update Derek Simmel 27 th EUGridPMA Meeting Rome, Italy January 14-16, 2013.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
IGTF Risk Assessment Team 5/11/091.
IGTF, WLCG, EGI and SHA-2 (and RFC proxies) David Kelsey (STFC-RAL and WLCG) TAGPMA meeting, Panama City Aug 2012.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
Ian Bird, CERN WLCG Project Leader Amsterdam, 24 th January 2012.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Middleware updates Peter Solagna – EGI.eu OMB – 16/07/ /3/
Classic X.509 AP updates (v4.1)
EUGridPMA CAOPS-WG and IGTF Issues March 2013 Charlottesville, VA, USA David Groep, Nikhef, EUGridPMA, and EGI.
HellasGrid CA & euGridPMA
Update on SHA-2 and RFC proxy support
EUGridPMA Status Review … and proposals February 28, 2012 Taipei, TW
SHA-2 Migration status David Groep Nikhef Nikhef, Amsterdam
OIDC Federation for Infrastructures
AuthN Middleware Requests
and the SHA-1 depreciation time line and status
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Presentation transcript:

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Introduction of SHA-2 in the EGI Infrastructure David Groep, EGI-IGTF Liaison Nikhef and BiG Grid, for EGI.eu EGI Technical Forum 20121

EGI-InSPIRE RI Background Digital signatures are used in identity PKI and TLS session establishment What is signed is not the text itself, but a ‘digest’ or ‘hash’ thereof If you find two texts with the same digest, you can swap these without breaking the signature This is referred to as ‘breaking’ the digest Many digests have been devised and broken like MD2, MD4, or MD5, or are trivial (CRC32) and not used for crypto EGI Technical Forum 20122

EGI-InSPIRE RI SHA-1 and SHA-2 SHA-1: 1 st generation (SHA-“0” was withdrawn) –160 bits nominal, 80 bits effective, 51 bits ‘left’ –published 1995 –NIST end date December 2010 SHA-2: 2 nd generation ‘secure hash algorithm’ –several variant lengths: 256 (224), 512 (384) –most common: 256 and 512 –published 2001, EGI Technical Forum 20123

EGI-InSPIRE RI Why bother? inherent threat to signatures (and PKI) if SHA-1 is spectacularly broken –fake certificates could suddenly be trusted although threat to SHA-1 is different than MD5 SHA-1 is broken ‘enough’ for make CABForum act and forbid its use –would anyway be following NIST advice –makes all commercial CAs move (Comodo: TCS, InCommon; DigiCert: OSG, QuoVadis) –US govt making SHA-2 requirement to bid some communities already require SHA EGI Technical Forum 20124

EGI-InSPIRE RI Preventing a sudden mess IGTF is to try preventing sudden melt-down by pushing for SHA-2 now –allow regular rekey cycle to take care of legacy SHA- 1 certificates, without upsetting users/admins –introduce SHA-2 gradually to allow transition –introduce early enough to escape from the mathematicians and cryptanalysts –in synch with other commercial/OSS software EGI Technical Forum 20125

EGI-InSPIRE RI Considerations Strength of SHA-1 is decreasing (from 80 bits now down to 51 bits) –collision can now be found in ~500 coreyears? –making a colliding certificate is luckily much harder for the moment –but also MD5 was ‘suddenly’ broken But not all middleware is ready –software issues almost force move to both SHA-2 and RFC3820 proxies at same time EGI Technical Forum 20126

Current state of affairs There are various pieces of middleware and experiment-ware that need to be made ready for SHA-2 or RFC proxy support – SHA-2: dCache, BeStMan (RFC proxies already supported by these) – RFC: Argus, CREAM, WMS, DIRAC, … – Central EGI/OSG/… services – EGI Operations will help with the assessment All EMI-2 products (released May 21) should support RFC proxies – WMS not yet available – Very little uptake so far – Also SHA-2 should be supported, except for dCache – verified? It may be many weeks before the affected products can be endorsed by UMD for generic deployment on EGI sites – EMI-2 is a major release with many changes OSG did not report additional constraints for their MW Maarten Litmaath (CERN)7

Updated phases and milestones (1) 1. Deployment of SW supporting RFC proxies – Proxy usage: Legacy RFC  only in special tests SHA-2  only in special tests – SW supports: Legacy RFC  maybe SHA-2  maybe – Milestone: All deployed SW supports RFC proxies  summer 2013 ? – Additional goal: All deployed SW supports SHA-2, except dCache and BeStMan  summer 2013 ? Maarten Litmaath (CERN)8

EGI-InSPIRE RI Software time lines Software support time linesin EGI –UMD-1 EoL around May 2013 (no SHA-2) –UMD-2 available now (mostly w/SHA-2) –UMD-3 availability around May 2013 Need to agree acceptable timeline for all major RPs in IGTF bearing in mind the risk to SHA1 –wLCG needs stability for extended running –other RPs ‘should’ be ready, but more actual testing would be nice (PRACE, OSG) EGI Technical Forum 20129

EGI-InSPIRE RI Revised time line For Relying Parties including EGI “The recommendation is that IGTF CAs will not issue general availability SHA-2 certificates before 1 August 2013” EUGridPMA Lyon meeting EGI Technical Forum

EGI-InSPIRE RI EoL Considerations If SHA-1 is broken, revocation and transition will be immediate as inspired by the categorization in the HASHRAT document The scheduled end of life for SHA-1 end-entity certificates (EEC’s) is 1 September 2014, meaning that SHA-1 EECs SHOULD have a validUntil date no later than that date. If there are CAs with EECs having a later date, the primary mitigation of the risk in case SHA-1 is broken will be removal of said CA from the IGTF distribution (and by inference from EGI via ‘obsoletion’ in the distro) EGI Technical Forum

EGI-InSPIRE RI CA time lines CAs SHOULD have SHA-2 capability by October 1 st 2012 There is no need to move existing CA self-signed roots to SHA-2 since we rely only on the distributed metadata Since intermediate CAs are distributed but the distribution can be superseded by dynamic CA chains (subject to the namespace constraints) … these SHOULD be SHA-2 after 31 March 2014, but if still based on SHA-1 these MUST be revoked and re- issued if and when SHA-1 is broken (like for EECs). New CA certificates generated after April 2014 SHOULD be SHA-512 noting that existing (self-signed) CA certs MAY be SHA EGI Technical Forum

EGI-InSPIRE RI SHA variants and CRLs Only SHA-256 and SHA-512, and not 224 nor 384. Each CA MAY pick its own variant. CRLs on the default CDP URL SHOULD be SHA-1 until at least 1 September CAs MAY start distributing SHA-2 based CRLs after that date, and MAY have SHA-2 based CRLs available on alternate CDPs after 1 October If the same subject is signed twice (once SHA-1 and once SHA-2) the certificates must use different serial numbers. The same is true of CRLs with same data: these must have different sequence numbers EGI Technical Forum

EGI-InSPIRE RI Vulnerabilities Breakage of the SHA-1 algorithm in a way that allows trivial generation of plaintexts with a specific hash necessitates removal of SHA-1 algo support. This is a software vulnerability issue outside of our scope and SHOULD be dealt with using regular vulnerability mechanisms of the RPs. It then WILL necessitate SHA- 2 based root certs as well EGI Technical Forum

EGI-InSPIRE RI SLCS CAs ‘end-of-life’ SHA-2 migration recommendation does not apply to certificates with a short life time (for SLCS CAs) until at least 1 September EGI Technical Forum

EGI-InSPIRE RI Testing middleware You can test with dedicated SHA-2 CAs –OpenID test personal certs: CILogon Basic (personal only) –CERN IT/IS TCA SHA-2 expt. CA (host+personal) Or with accredited CAs (host+personal) –BalticGrid, ROSA, DutchGrid, GridCanada, DigiCert, (past 1 Oct: INFN, CESNET and more) EGI Technical Forum

EGI-InSPIRE RI SHA-2 time line EGI Technical Forum SHA-2 widely available for testing August 2013: SHA-2 certs ‘general availability’- expect seeing SHA-2 be used in many places ~ April 2013: EoL of UMD-1 1 Sept 2013: CAs on 12-month cycle can start SHA-2 only mode or use reduced life cycle 1 Sept 2014: last ‘regular’ long-lived SHA-1 cert expires selected CAs can continue issuing SHA-1, but face risk of removal in case SHA-1 is broken 1 Sept 2014: default CRL distribution point will become SHA-2 end of ‘critial ops’ mode for wLCG now

EGI-InSPIRE RI QA EGI Technical Forum Today: start SHA-2 testing – preferentially with your local CA 1 August 2013: SHA-2 general availability certs 1 September 2014: default CRLs move to SHA-2 end of life for last regular SHA-1 cert if SHA-1 is not decidedly broken before these dates...