EGEE-II Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks gLite Release Process Maria Alandes Pradillo.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks From ROCs to NGIs The pole1 and pole 2 people.
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.
EGEE is a project funded by the European Union under contract IST Testing processes Leanne Guy Testing activity manager JRA1 All hands meeting,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
Enabling Grids for E-sciencE SA1 EGEE-II INFSO-RI The Pre-Production Service in WLCG/EGEE A. Retico, N. Thackray CERN – Geneva, Switzerland PPS.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Middleware Deployment and Support in EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
EGEE is a project funded by the European Union under contract IST JRA1-SA1 requirement gathering Maite Barroso JRA1 Integration and Testing.
INFSO-RI Enabling Grids for E-sciencE SA1 and gLite: Test, Certification and Pre-production Nick Thackray SA1, CERN.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks NA2 – Dissemination, Outreach and Communication.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Multi-level monitoring - an overview James.
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
JRA Execution Plan 13 January JRA1 Execution Plan Frédéric Hemmer EGEE Middleware Manager EGEE is proposed as a project funded by the European.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
INFSO-RI Enabling Grids for E-sciencE Information and Monitoring Status and Plans Plzeň, 10 July 2006 Steve Fisher/RAL.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Task tracking SA3 All Hands Meeting Prague.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Update Authorization Service Christoph Witzig,
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks SA3 partner collaboration tasks & process.
EGEE is a project funded by the European Union under contract IST Roles & Responsibilities Ian Bird SA1 Manager Cork Meeting, April 2004.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Middleware Update Maria Alandes Pradillo.
INFSO-RI Enabling Grids for E-sciencE gLite Certification and Deployment Process Markus Schulz, SA1, CERN EGEE 1 st EU Review 9-11/02/2005.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Patch Preparation SA3 All Hands Meeting.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MSA3.4.1 “The process document” Oliver Keeble.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
WP3 EGEE Steve Fisher / RAL 14/1/2004. WP3 Steve Fisher/RAL - 14/1/2004EGEE2 Credits My slides have been stolen from many sources including: –Fabrizio.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE Operations: Evolution of the Role of.
JRA1 Meeting – 09/02/ Software Configuration Management and Integration EGEE is proposed as a project funded by the European Union under contract.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks What all NGIs need to do: Helpdesk / User.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Argus: command line usage and banning Christoph.
SLAs with Software Provider. Scope “…declare the rights and responsibilities between EGI.eu and the Software Provider for a particular component.” Which.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
JRA1 Middleware re-engineering
Directory/Inventory – info sharing for security people
SA1 Execution Plan Status and Issues
Vulnerability Handling – experience from the October Torque issue
EGI Software Vulnerability Group (SVG) report to CSIRT F2F
Ian Bird GDB Meeting CERN 9 September 2003
Grid Services Security Vulnerability and Risk Analysis
Romain Wartel EGEE08 Conference, Istanbul, 23rd September 2008
EGI Security Risk Assessment
Software Vulnerability Group Status update
Prevention is better than Cure
Presentation transcript:

EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central Europe in EGEE II Kálmán Kővári, IT-Services Hungary Ltd, RMKI-KFKI, Loránd Eötvös University Budapest (ELTE)‏ Bratislava, 29th April 2008 (Based on Linda Cornwall's EGEE'07 presentation with some updates)‏

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 2 Contents Role of the Grid Security Vulnerability Group (GSVG)‏ Setup and people involved GSVG process and Strategy, Risk Assessments Activity with numbers Summary Time for Q&A

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 3 Role of GSVG Stated aim in EGEE-II The aim is “to incrementally make the Grid more secure and thus provide better availability and sustainability of the deployed infrastructure” –This is recognition that it cannot be made perfect immediately Main activity is to handle specific Grid Security Vulnerability issues which may be reported by anyone

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 4 Setup of the issue handling in EGEE II The GSVG issues group in EGEE II consists of Core Group Members –Run the general process –Ensure information is passed on –1 on duty each working day Risk Assessment Team (RAT)‏ –Carry out Risk Assessments –At present 8 full RAT members –Plus 4 others which confine their work to their own area of expertise RAT people are security experts, experienced system administrators, deployment experts and developers

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 5 People involved Linda Cornwall, Stephen Burke, David Kelsey (RAL, UK) Vincenzo Ciaschini (INFN, Italy)‏ Ákos Frohner, Maarten Litmaath, Romain Wartel (CERN) Oscar Koeroo (NIKHEF, Holland)‏ Daniel Kouril (CESNET, Czech Republic)‏ Kálmán Kővári (KFKI-RMKI, Hungary)‏ Eygene Ryabinkin (RRC-KI, Russia) Åke Sandgren (HPC2N, Sweden)‏ John Walsh (TCD, Ireland )‏

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 6 Process and strategy in EGEE-II – to first order Issue may be submitted by anyone – Risk Assessment carried out by the Risk Assessment Team (RAT)‏ –GSVG investigate issue –If issue is Valid, placed in one of 4 risk categories –Extremely Critical, High, Moderate or Low Target Date for resolution set according to Risk –Fixed – 2 days EC, 3 weeks High, 3 months Moderate, 6 months Low Information kept private until advisory is released –Only RAT and those involved in resolution are informed –(Unlike pre-EGEE-II)‏ Advisory released when issue fixed or on Target Date, whichever is the sooner –(At least for EGEE/glite software)‏

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 7 Types of issue For Issues that involve a bug in the gLite middleware –majority of issues are this type –Produce a special bug for JRA1 with a Risk and Target Date (TD) attached –Produce an advisory –Place the advisory on the web page when patch released or on the TD –In future we plan to send advisory to open subscription mailing list  Need to sign mails – otherwise it becomes a vulnerability! For operational issues –Produce an advisory to OSCT –OSCT inform sites as appropriate Other types of issues/concerns –Inform TCG/SCG/MWSG for discussions as appropriate

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 8 Anyone! OSCT GSVG TCG EMT + developers SCG Advisory disclosure on web Operational issue Patch available When Patch is available or on Target Date advisory placed on web Missing functionality and other general concerns are discussed with TCG and SCG, also MWSG Security bug in middleware PATCH Released Basic interactions with other groups in EGEE-II Release refers to advisory, advisory refers to release Submit issue

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 9 4 Risk Categories Extremely Critical –Examples  Trivial Grid Wide DoS with no Credentials  Remote Root access with or without Credentials –Target Date – 2 days High –Examples  Identity theft or impersonation  Exploit against MW component that gives elevated access  Grid-wide disruption  Information leakage which is illegal or embarrassing –Target Date – 3 weeks

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 10 4 Risk Categories (contd) Moderate –Examples  Confidential issues in user information  Local DoS  Potentially serious, but hard to exploit problem. E.g. hard to exploit buffer overflow –Target Date = 3 months Low –Examples  Small system information leak  Issue which is only exploitable in unlikely circumstances, or where an exploit cannot be found  Issue where impact on service minimal –Target Date = 6 months

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 11 Disclosure Policy and Target Date By carrying out Risk Assessments and setting a TD we are allowing the resolution of issues to be prioritized The TD can also be seen as the maximum length of time the issue can be lived with, without taking action On Target Date, information on the issue is made public –Regardless of whether a fix is available –This only applies to EGEE software This is to ensure confidence in the system –People less likely to discuss issues on public mailing list rather than use our system Public disclosure ensures all those who install the software have access to information on known vulnerabilities

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 12 Some numbers (10 th April 2008)‏ 133 issues entered since we started in open (39 s/w bugs, 16 more general)‏ 78 closed (soon we close about 12 more when glite 3.1/code in head fully rolled out.)‏ Risk – all those fully assessed with EGEE-II criteria –1 Extremely Critical, 11 High (2 open), 15 Moderate (9 open), 19 Low (14 open)‏ Risk – all open s/w bugs –2 High, 9 Moderate, 14 Low, 2 not applicable, 12 Pre-EGEE2, 2 n/a (software not yet certified) –Pre-EGEE2 sites informed according to pre-EGEE2 process 25 advisories put on the web since July 2007 –Before then advisories were included in the release notes

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 13 Not perfect – but improving Processing when issues fixed –During mid 2007 we found that some have been fixed but advisory not included in release notes –If sites are keeping software patched, some patches fixed vulnerabilities which didn’t get advisories included in release notes –Changed system a little and this is working well with SA3  release notes point to advisory  release notes include affected modules and any installation info  advisory refers to “Release” Some issues not getting fixed by the Target Date –Now we are putting out the advisories on the web page –Some have been around for a long time Some in the past have seen GSVG as a bit of a ‘black hole’ –Hopefully this will improve as we are now putting advisories on the web page

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 14 What still needs improvement Some issues not a simple software bug –May require re-design, and/or a major addition to functionality to fully address –Can’t simply ask developers to patch –Problems that have been in database for a while are well known Solutions need to be sought between TCG, SCG, and others example – glexec concerns –There are concerns about whether the design/principle is appropriate and complies with policy This is main area that needs improvement –issues that have been in the system long term tend to be this type

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 15 Developers guidelines Wish to minimize introduction of new grid security vulnerability issues in the code In 2005 produced a document including a checklist for developers – Tended not to be used, developers have too much to do, was probably too long Suggest a list of top things to watch out for e.g. – several vulnerabilities are simple file permissions  Both middleware developers and those producing yaim configuration files need to ensure file permissions are set correctly –checking input – avoiding SQL injection and XSS vulnerabilities –Still get buffer overflow vulnerabilities

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 16 What have we learnt? Vulnerability handling is a sensitive area – hard to get agreement on what we should do Even when we agree in principle what should be done, it is a lot harder to actually do it –Everything takes far longer than expected Non-trivial getting processes working well with multiple parties involved in different institutions Keep things as simple as possible –Tendency to make things too complicated –Easy to get bogged down trying to define how to cope with each type of issue and situation –Have a few basic cases, then use some common sense with those that don’t quite fit

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 17 Where further? Security awareness rose recently –No grid abuse yet reported –Goal is to keep it up in long term Lately code reviews have created proactive issues: –Some SQL injection issues revealed –Some false library links corrected –Still ongoing, results have proven worth the effort All the recent activities are to be continued in EGEE-III –2-3 New partners expected to contribute manpower to GSVG We have reached a certain maturity, efficient level of work –We provide a reliable service to developers and sysadmins –Still some need to fine tune processes between the various group –Have to stay reliable, that needs manpower still

Enabling Grids for E-sciencE EGEE-II For EGEE-III GSVG should be more active in suggesting general ways to improve security –e.g. software signing

Enabling Grids for E-sciencE EGEE-II EGEE II CE ROC - Kálmán Kővári - GSVG Activity in CE 19 More info The Grid Security Vulnerability Group webpage is at Time for discussion!