EUGridPMA Status and Current Trends and some IGTF topics August 2016 APGridPMA APAN meeting David Groep, Nikhef & EUGridPMA.

Slides:



Advertisements
Similar presentations
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
Advertisements

INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Updates from the EUGridPMA David Groep, Oct 11 th, 2011.
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
EUGridPMA Status, current trends and some technical topics March 2013 Boulder, CO, USA David Groep, Nikhef & EUGridPMA.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
EUGridPMA status and updates David Groep, GGF18. EUGridPMA Status Update, TAGPMA Ottawa David Groep – Items  EUGridPMA.
European Grid Policy Management Authority. Event - 2/total Speaker Name – Coverage of the EUGridPMA Green: Countries with an accredited.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America The Latin American Catch-all Grid Certification.
APGridPMA Update Eric Yen APGridPMA August, 2014.
TR-GRID CA Self-Auditing Results and Status Update EUGridPMA Meeting September 12-14, 2011 Marrakesh Feyza Eryol, Onur Temizsoylu TUBITAK-ULAKBIM
BG.ACAD CA HTTP :// CA. ACAD. BG S ELF - AUDIT REPORT 2014 Vladimir Dimitrov IICT-BAS ( 32 nd EUGridPMA Meeting Poznan, 8-10.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
On live video supported F2F May 9-11, 2016 Abingdon, Oxfordshire, UK.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Updates from the EUGridPMA David Groep, Oct 17 st, 2007.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
EUGridPMA Status and Current Trends and some IGTF topics March 2015 Taipei, TW David Groep, Nikhef & EUGridPMA.
IGTF Generalised Assurance comments by federation operators with a SAML background September 19-21, 2016 CERN, Geneva, CH.
IGTF in 10 years enabling the interoperable global trust federation Nikhef, Amsterdam supported the Dutch national e-Infrastructure funded and coordinated.
PKGrid CA Self-Audit 2012 Adeel-ur-Rehman Mansoor Sheikh.
Building Trust for Research and Collaboration
EUGridPMA Status and Current Trends and some IGTF topics April 2017 TAGPMA I2GS April Meeting David Groep, Nikhef & EUGridPMA.
WLCG Update Hannah Short, CERN Computer Security.
RCauth.eu CILogon-like service in EGI and the EOSC
EUGridPMA Status and Current Trends and some IGTF topics March 2016 Miami, FL, USA David Groep, Nikhef & EUGridPMA.
EGI Updates Check-in Matthew Viljoen – EGI Foundation
AARC Update What’s been happening in AARC which matters for GÉANT
AEGIS Certification Authority
Classic X.509 AP updates (v4.1)
EUGridPMA CAOPS-WG and IGTF Issues March 2013 Charlottesville, VA, USA David Groep, Nikhef, EUGridPMA, and EGI.
UGRID CA Sergii Stirenko, Oleg Alienin
LCG Security Status and Issues
Christos Kanellopoulos
HellasGrid CA & euGridPMA
EUGridPMA Status and Current Trends and some IGTF topics March 2017 APGridPMA Spring Meeting David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics October 2016 TAGPMA24 meeting David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics March 2016 Taipei, TW David Groep, Nikhef & EUGridPMA.
The RCauth.eu CILogin-like TTS Pilot in EGI
Sustainability for the AARC CILogin-like TTS Pilot
EUGridPMA Status and Current Trends and some IGTF topics October 2017 APGridPMA Autumn Meeting David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some technical topics November 2013 La Plata, AR David Groep, Nikhef & EUGridPMA.
Policy in harmony: our best practice
EUGridPMA Status and Current Trends and some IGTF topics June 2014 Lehi, UT, US David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics March 2014 Taipei, TW David Groep, Nikhef & EUGridPMA.
Assessing Combined Assurance
Assessing Combined Assurance
Policy and Best Practice … in practice
Update - Security Policies
Supporting communities with harmonized policy
EUGridPMA Status and Current Trends and some IGTF topics March 2018 APGridPMA ISGC Meeting David Groep, Nikhef & EUGridPMA.
MaGrid CA Self audit and update
RCauth.eu CILogon-like service in EGI and the EOSC
Community AAI with Check-In
Emir Imamagić University Computing Centre (Srce)
BG.ACAD CA Self-audit report 2018
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

EUGridPMA Status and Current Trends and some IGTF topics August 2016 APGridPMA APAN meeting David Groep, Nikhef & EUGridPMA

2 EUGridPMA Topics  EUGridPMA (membership) status  New & coming CAs: RCauth.eu/AARC CILogon-like TTS; DarkMatter  Assurance Profiles:  IOTA update, implementation of Generalised Assurance Profiles & PKI Guidelines  New AP structure and GFD.169/review sheets  GFD.225 OGF Certificate Profile and OGF News  Model implementations for video-supported vetting  Guidelines on Trusted Credential Stores & (finally) on-line CAs  Disaster Recovery and Business Continuity development  Dissemination and impact  IGTF-related topics See the Abingdon summary:

3 Geographical coverage of the EUGridPMA  26 of 28 EU member states (all except LU, MT)  + AM, CH, DZ, EG, GE, IR, IS, JO, MA, MD, ME, MK, NO, KE, PK, RS, RU, SY, TR, UA, CERN (int), TCS (EU) In progress  ZA, TZ, AE

4 Membership and other changes  Responsiveness challenges for some members  JUNET CA – suspended  HIAST CA – temporarily withdrawn for operational reasons  Identity providers: both reduction and growth  New CA in Kenya (by the NREN KENET) classic on-line CA  New CA from CERN: IOTA (scoped) CA  New CA for e-Infras: RCauth.eu IOTA CA  Upcoming CA for UAE: DarkMatter  Self-audit review  Cosmin Nistor replaced Kaspars as review process coordinator  Self-audits progressing on schedule for most CAs

5 CERN LCG IOTA CA Specific Identifier Only Trust Assurance CA – adds ‘VO membership’ constraints internally to fit with current state of e- Infrastructures and wLCG sites* *

6  Ability to serve a large pan-European user base without national restrictions  without having to rely on specific national participation exclusively for this service  serving the needs of cross-national user communities that have a large but sparsely distributed user base  Use existing resources and e-Infrastructure services  without the needs for security model changes at the resource centre or national level  Allow integration of this system in science gateways & portals with minimal effort  only light-weight industry-standard protocols, limit security expertise (and exposure)  Permit the use of the VOMS community membership service  attributes for group and role management in attribute certificates  also for portals and science gateways access the e-Infrastructure  Concentrate service elements that require significant operational expertise  not burden research communities with the need to care for security-sensitive service components  keep a secure credential management model  coordinate compliance and accreditation – and help meet EU privacy stuff in just one place to ease adoption  Optional elements: ability to obtain CLI tokens (via ssh agent or even U/P); implicit AuthZ RCauth.eu white-label CA for the AARC CILogon-like TTS Pilot

7 CILogon-like TTS Pilot - distributable elements

8 8 More pretty pictures

9  Users could enroll directly, but are in practice using a Master Portal/Credential Manager  The credential manager is explicitly trusted by the RCauth CA service  exchange of OIDC client secret to authenticate  ‘need to know’: (master) portals will hold user credentials, and we need to protect users per the PKP Guidelines  CA web server checks the incoming assertions from the IdP filter  Uses CILogon/OAuth4MP software based on the Shibboleth SAML implementation over server-side TLS  Connected for now to the SURFconext WAYF  … and yes, we check the SAML signature ;-) When moving to wider support of eduGAIN  WAYF IdP filter check the incoming SAML2Int  Use multi-domain WAYF over server-side TLS  Based on SimpleSAMLphp implemenation with custom filters  … and yes, also here we’ll check the SAML signature  FIMS IdPs: leverage existing infrastructures 9 Enrolment and issuance [4.2]

10 BROADER ISSUES FROM THE ABINGDON MEETING

11 Assurance Profile  Both Assurance Profile + PKI Technology Guidelines complete  now Classic and IOTA profile updated as well “We hereby agree that the version 5.0 of the Classic profile is equivalent to version 4.4, and that version 2.0 of the IOTA profile is equivalent to version 1.1a. There is thus no need for CAs that are currently accredited to review or revise their own policies and practices”

12 And now what?  The profiles themselves are now ‘rather short’  There are no self-audit template sheets for new structure  Nor is there any guidance for reviewers (if so needed) Work to do - for the first reviews and self-audits that come  GFD.169 appendix: item mapping for APs and PKI Tech  Review spreadsheets: two sheets for each review?

13 GFD.225  Now ‘really’ almost done – Jens also picked the last nits:  About to be published soon now … and Jens is now anyway the OGF VP of Standards …  Also there the reviews should probably check compliance

14 Video-supported vetting “[Vetting] should be based on a face-to-face meeting and should be confirmed via photo-identification and/or similar valid official documents.” (BIRCH and CEDAR APs)  Many support explicit F2F only, yet designate RAs in different ways  Video-supported and notary-public postal mail & video: BR, TR  Government records: some TCS subscribers (universities with access to these databases)  Kantara LoA 2: some TCS countries (SE) for some of their applicants

15 On the notary public & govt. databases  In many countries, notaries are rather exclusive, and rather expensive to attest to documents (think ~€25 + half a day & travel for the appointment)  Access to databases to rather complex for most orgs  So e.g. HPCI and others are looking for alternatives By ‘chance’, I was exposed to another, quite interesting and rigorous process – which was easier – if you’re allowed to keep photographs … … and which some CAs (specifically HPCI, but I expect many others) would seriously want to consider!

16 Evolution of guidance “The aim should be to stay within the 'bandwidth of trust' described in the current text: between the (possibly worthless) notary-public attestations, and the more trusted real in-person hand-shake vetting.” “If appropriate compensatory controls are in place and we can protect same-person continuity (non-reassignment) as well as traceability, it should be viable. Compensatory controls have some 'hard' requirements in the model process described in the Wiki:” It is important that this be described and reviewed in each case, so the proposal is that "The following is also considered to be an acceptable process for implementing method 2 - if so acceptably documented in the CP/CPS and endorsed by the accrediting PMA” Ongoing work item

17 Trusted Credential Stores  In easing access to e-Infrastructures incrasingly credential management systems appear: UnityIDM, MyProxy hosting, AARC’s Master Portals, …  Issuing Authorities promoting PKP guidelines (e.g. RCauth.eu) need framework to assess explicitly-connected portals  Guidance on what constitutes an ‘acceptable’ credential store  Guidance for operators on ‘community best practice’

18 We have also documented on-line CA Guidance now  The on-line CA guidelines document available at  Codifies current requirements from Classic AP and current best practice – and permits more explicitly the key generation ceremony  Follows AP structure: Operational requirements Network controls Key generation Key storage Key Activation Key Deactivation Key End of Life Procedural Controls Site Security Publication and repository responsibilities Audits Compromise and disaster recovery Operational requirements Network controls Key generation Key storage Key Activation Key Deactivation Key End of Life Procedural Controls Site Security Publication and repository responsibilities Audits Compromise and disaster recovery

19 Which one to pick if you want it ‘just done’ On-line CA architectures must ensure that only legitimate traffic related to certificate issuing operations will ever reach the on-line CA issuing system. This can be ensured in various ways:  (A) an authentication/request server, suitably protected and connected to the public network, and a separate signing system, connected to the front-end via a private link, that only processes approved signing requests and logs all certificate issuance;  (B) an authentication/request server containing also the HSM hardware, connected to a dedicated network that only carries traffic destined for the CA and is actively monitored for intrusions and is protected via a packet-inspecting stateful firewall; where it is noted that model A type designs are more readily secured and usually need less components and effort to maintain and operate and therefore preferred.

20 Best practice now documented  “To further protect the issuing CA and permit revocation thereof, it is strongly advised that all on-line issuing CAs be a subordinate of an off-line root or higher-level CA, where the off-line root may have a long-lived (one year or longer) CRL.”  “Any on-line CA shall have a disaster recovery and business continuity plan. For CAs where the key material has been generated inside the HSM, this plan should include regular tests of the capability to recover the key in the HSM from archival material.”  And a bit more, just read the doc …

21 Contribution sought: Disaster WG “Develop guidelines for the structure and for topics to be addressed by the disaster recovery section of both the CP/CPS and in private specific plans.”  Some guidance exists, but it is scattered and not shared  Many CP/CPS “section 5” text gives hits, but no best practice For now: JensJ, JanC, ScottR, ReimerKM, DavidG, UrsulaE & ShahinR Volunteers welcome!

22 IPv6 status  New continuous v6 CRL monitor  39 CAs offer working v6 CRL  but: also 2-4 CAs that give AAAA record but the GET fails …  Still 54 broken endpoints support only legacy IP  dl.igtf.net can act as v6 source-of-last-resort  fetch-crlv3 v has an explicit mode to force-enable IPv6 also for older perl versions  Added option "--inet6glue" and "inet6glue" config setting to load the Net::INET6Glue perl module (if it is available) to use IPv6 connections in LWP to download CRLs

23 Dissemination and outreach ‘We do have a story to tell, but in practice we're not telling it’ Worthwhile topics in the short term would be:  the new assurance level specification - Jens  the onboarding of new CAs, like Darkmatter and RCauth  new use cases and RIs that use the LoA levels At least Jens, IanN, and Jules are willing to help with (some of) these efforts. Other concrete actions for volunteers pick-up:  white paper on the assurance model (or more)  create a Wikipedia entry for IGTF (it's only mentioned now in a lemma on federation written by Rainer Hoerbe) and we should update the IGTF entry on the REFEDS Wiki

24 Other IGTF related topics  Redundancy of operations and ROBAB proof-ness  TAGPMA TIs and distribution builders  Web site updates and infrastructure

25 UPCOMING MEETINGS For more details, see but meanwhile:

26 IGTF+ Meeting Agenda  IGTF All Hands meeting & EUGridPMA 38, Sept 2016, Geneva  EUGridPMA 39, Jan 30 th – Feb 1 st 2017, Florence  EUGridPMA 40, May 2017, Ljubljana