EUGridPMA Status and Current Trends and some IGTF topics March 2016 Miami, FL, USA David Groep, Nikhef & EUGridPMA.

Slides:



Advertisements
Similar presentations
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Advertisements

David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Updates from the EUGridPMA David Groep, Oct 11 th, 2011.
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
EUGridPMA Status, current trends and some technical topics March 2013 Boulder, CO, USA David Groep, Nikhef & EUGridPMA.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
European Grid Policy Management Authority. Event - 2/total Speaker Name – Coverage of the EUGridPMA Green: Countries with an accredited.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
On live video supported F2F May 9-11, 2016 Abingdon, Oxfordshire, UK.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
EUGridPMA Status and Current Trends and some IGTF topics August 2016 APGridPMA APAN meeting David Groep, Nikhef & EUGridPMA.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
EUGridPMA Status and Current Trends and some IGTF topics March 2015 Taipei, TW David Groep, Nikhef & EUGridPMA.
IGTF Generalised Assurance comments by federation operators with a SAML background September 19-21, 2016 CERN, Geneva, CH.
IGTF in 10 years enabling the interoperable global trust federation Nikhef, Amsterdam supported the Dutch national e-Infrastructure funded and coordinated.
PKGrid CA Self-Audit 2012 Adeel-ur-Rehman Mansoor Sheikh.
Building Trust for Research and Collaboration
EUGridPMA Status and Current Trends and some IGTF topics April 2017 TAGPMA I2GS April Meeting David Groep, Nikhef & EUGridPMA.
WLCG Update Hannah Short, CERN Computer Security.
RCauth.eu CILogon-like service in EGI and the EOSC
AARC Update What’s been happening in AARC which matters for GÉANT
David Kelsey CCLRC/RAL, UK
AEGIS Certification Authority
Classic X.509 AP updates (v4.1)
EUGridPMA CAOPS-WG and IGTF Issues March 2013 Charlottesville, VA, USA David Groep, Nikhef, EUGridPMA, and EGI.
UGRID CA Sergii Stirenko, Oleg Alienin
LCG Security Status and Issues
Christos Kanellopoulos
Jens Jensen, STFC Sep EUGridPMA Manchester
HellasGrid CA & euGridPMA
EUGridPMA Status and Current Trends and some IGTF topics March 2017 APGridPMA Spring Meeting David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics October 2016 TAGPMA24 meeting David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics March 2016 Taipei, TW David Groep, Nikhef & EUGridPMA.
The RCauth.eu CILogin-like TTS Pilot in EGI
Sustainability for the AARC CILogin-like TTS Pilot
EUGridPMA Status and Current Trends and some IGTF topics October 2017 APGridPMA Autumn Meeting David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some technical topics November 2013 La Plata, AR David Groep, Nikhef & EUGridPMA.
Policy in harmony: our best practice
EUGridPMA Status and Current Trends and some IGTF topics June 2014 Lehi, UT, US David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics March 2014 Taipei, TW David Groep, Nikhef & EUGridPMA.
Assessing Combined Assurance
Assessing Combined Assurance
Leveraging the IGTF authentication fabric for research
Leveraging the IGTF authentication fabric for research
“RaaS” – towards RCauth.eu as a Service
Pilots in AARC Arnout Terpstra (AARC2) / Paul van Dijk (AARC1)
Update - Security Policies
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
EUGridPMA Status and Current Trends and some IGTF topics March 2018 APGridPMA ISGC Meeting David Groep, Nikhef & EUGridPMA.
OIDC Federation for Infrastructures
MaGrid CA Self audit and update
RCauth.eu CILogon-like service in EGI and the EOSC
Community AAI with Check-In
BG.ACAD CA Self-audit report 2018
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

EUGridPMA Status and Current Trends and some IGTF topics March 2016 Miami, FL, USA David Groep, Nikhef & EUGridPMA

EUGridPMA Topics EUGridPMA (membership) status Assurance Profiles: New & coming CAs: RCauth.eu/AARC CILogon-like TTS; DarkMatter Assurance Profiles: IOTA update, implementation of Generalised Assurance Profiles & PKI Guidelines New AP structure and GFD.169/review sheets GFD.225 OGF Certificate Profile and OGF News Model implementations for video-supported vetting Guidelines on Trusted Credential Stores & (finally) on-line CAs Disaster Recovery and Business Continuity development Dissemination and impact See the Abingdon summary: https://www.eugridpma.org/meetings/2016-05/

Geographical coverage of the EUGridPMA 26 of 28 EU member states (all except LU, MT) + AM, CH, DZ, EG, GE, IL, IR, IS, JO, MA, MD, ME, MK, NO, PK, RS, RU, SY, TR, UA, CERN (int) + TCS (EU) Pending or in progress ZA, TZ, AE

Membership and other changes Responsiveness challenges for some members JUNET CA – suspended HIAST CA – temporarily withdrawn for operational reasons Identity providers: both reduction and growth New CA in Kenya (by the NREN KENET) classic on-line CA New CA from CERN: IOTA (scoped) CA New CA for e-Infras: RCauth.eu IOTA CA Self-audit review Cosmin Nistor replaced Kaspars as review process coordinator Self-audits progressing on schedule for most CAs

* http://lcg-ca.web.cern.ch/lcg-ca/doc/WLCG-CERN-IOTA-statement-MB.pdf CERN LCG IOTA CA Specific Identifier Only Trust Assurance CA – adds ‘VO membership’ constraints internally to fit with current state of e-Infrastructures and wLCG sites* * http://lcg-ca.web.cern.ch/lcg-ca/doc/WLCG-CERN-IOTA-statement-MB.pdf

RCauth.eu white-label CA for the AARC CILogon-like TTS Pilot Ability to serve a large pan-European user base without national restrictions without having to rely on specific national participation exclusively for this service serving the needs of cross-national user communities that have a large but sparsely distributed user base Use existing resources and e-Infrastructure services without the needs for security model changes at the resource centre or national level Allow integration of this system in science gateways and portals with minimal effort only light-weight industry-standard protocols, limit security expertise (and exposure) Permit the use of the VOMS community membership service attributes for group and role management in attribute certificates also for portals and science gateways access the e-Infrastructure Concentrate service elements that require significant operational expertise not burden research communities with the need to care for security-sensitive service components keep a secure credential management model coordinate compliance and accreditation – and help meet EU privacy stuff in just one place to ease adoption Optional elements: ability to obtain CLI tokens (via ssh agent or even U/P); implicit AuthZ

CILogon-like TTS Pilot - distributable elements

More pretty pictures

Enrolment and issuance [4.2] Users could enroll directly, but are in practice using a Master Portal/Credential Manager The credential manager is explicitly trusted by the RCauth CA service exchange of OIDC client secret to authenticate ‘need to know’: (master) portals will hold user credentials, and we need to protect users per the PKP Guidelines CA web server checks the incoming assertions from the IdP filter Uses CILogon/OAuth4MP software based on the Shibboleth SAML implementation over server-side TLS Connected for now to the SURFconext WAYF … and yes, we check the SAML signature ;-) When moving to wider support of eduGAIN WAYF IdP filter check the incoming SAML2Int Use multi-domain WAYF over server-side TLS Based on SimpleSAMLphp implemenation with custom filters … and yes, also here we’ll check the SAML signature FIMS IdPs: leverage existing infrastructures

Broader issues from the Abingdon meeting

Assurance Profile Both Assurance Profile + PKI Technology Guidelines complete https://www.eugridpma.org/guidelines/authn-assurance/ https://www.eugridpma.org/guidelines/pkitech/ now Classic and IOTA profile updated as well “We hereby agree that the version 5.0 of the Classic profile is equivalent to version 4.4, and that version 2.0 of the IOTA profile is equivalent to version 1.1a. There is thus no need for CAs that are currently accredited to review or revise their own policies and practices”

And now what? The profiles themselves are now ‘rather short’ There are no self-audit template sheets for new structure Nor is there any guidance for reviewers (if so needed) Work to do - for the first reviews and self-audits that come GFD.169 appendix: item mapping for APs and PKI Tech Review spreadsheets: two sheets for each review?

GFD.225 Now ‘really’ almost done – Jens also picked the last nits: About to be published soon now … and Jens is now anyway the OGF VP of Standards … Also there the reviews should probably check compliance https://www.overleaf.com/646373kvfmwn

Video-supported vetting “[Vetting] should be based on a face-to-face meeting and should be confirmed via photo-identification and/or similar valid official documents.” (BIRCH and CEDAR APs) Many support explicit F2F only, yet designate RAs in different ways Video-supported and notary-public postal mail & video: BR, TR Government records: some TCS subscribers (universities with access to these databases) Kantara LoA 2: some TCS countries (SE) for some of their applicants

On the notary public & govt. databases In many countries, notaries are rather exclusive, and rather expensive to attest to documents (think ~€25 + half a day & travel for the appointment) Access to databases to rather complex for most orgs So e.g. HPCI and others are looking for alternatives By ‘chance’, I was exposed to another, quite interesting and rigorous process – which was easier – if you’re allowed to keep photographs … … and which some CAs (specifically HPCI, but I expect many others) would seriously want to consider!

Evolution of guidance Ongoing work item “The aim should be to stay within the 'bandwidth of trust' described in the current text: between the (possibly worthless) notary-public attestations, and the more trusted real in-person hand-shake vetting.” “If appropriate compensatory controls are in place and we can protect same-person continuity (non-reassignment) as well as traceability, it should be viable. Compensatory controls have some 'hard' requirements in the model process described in the Wiki:” http://wiki.eugridpma.org/Main/VettingModelGuidelines It is important that this be described and reviewed in each case, so the proposal is that "The following is also considered to be an acceptable process for implementing method 2 - if so acceptably documented in the CP/CPS and endorsed by the accrediting PMA”

Trusted Credential Stores In easing access to e-Infrastructures incrasingly credential management systems appear: UnityIDM, MyProxy hosting, AARC’s Master Portals, … Issuing Authorities promoting PKP guidelines (e.g. RCauth.eu) need framework to assess explicitly-connected portals Guidance on what constitutes an ‘acceptable’ credential store Guidance for operators on ‘community best practice’

We have also documented on-line CA Guidance now The on-line CA guidelines document available at https://wiki.eugridpma.org/Main/GuidelinesForOnLineCAs Codifies current requirements from Classic AP and current best practice – and permits more explicitly the key generation ceremony Follows AP structure: Operational requirements Network controls Key generation Key storage Key Activation Key Deactivation Key End of Life Procedural Controls Site Security Publication and repository responsibilities Audits Compromise and disaster recovery

Which one to pick if you want it ‘just done’ On-line CA architectures must ensure that only legitimate traffic related to certificate issuing operations will ever reach the on-line CA issuing system. This can be ensured in various ways: (A) an authentication/request server, suitably protected and connected to the public network, and a separate signing system, connected to the front-end via a private link, that only processes approved signing requests and logs all certificate issuance; (B) an authentication/request server containing also the HSM hardware, connected to a dedicated network that only carries traffic destined for the CA and is actively monitored for intrusions and is protected via a packet-inspecting stateful firewall; where it is noted that model A type designs are more readily secured and usually need less components and effort to maintain and operate and therefore preferred.

Best practice now documented “To further protect the issuing CA and permit revocation thereof, it is strongly advised that all on-line issuing CAs be a subordinate of an off-line root or higher-level CA, where the off-line root may have a long-lived (one year or longer) CRL.” “Any on-line CA shall have a disaster recovery and business continuity plan. For CAs where the key material has been generated inside the HSM, this plan should include regular tests of the capability to recover the key in the HSM from archival material.” And a bit more, just read the doc …

Contribution sought: Disaster WG “Develop guidelines for the structure and for topics to be addressed by the disaster recovery section of both the CP/CPS and in private specific plans.” Some guidance exists, but it is scattered and not shared Many CP/CPS “section 5” text gives hits, but no best practice For now: JensJ, JanC, ScottR, ReimerKM, DavidG, UrsulaE & ShahinR Volunteers welcome!

IPv6 status New continuous v6 CRL monitor http://cvmfs-6.ndgf.org/ipv6/overview.php 39 CAs offer working v6 CRL but: also 2-4 CAs that give AAAA record but the GET fails … Still 54 broken endpoints support only legacy IP dl.igtf.net can act as v6 source-of-last-resort fetch-crlv3 v3.0.10+ has an explicit mode to force-enable IPv6 also for older perl versions Added option "--inet6glue" and "inet6glue" config setting to load the Net::INET6Glue perl module (if it is available) to use IPv6 connections in LWP to download CRLs

Upcoming meetings

IGTF+ Meeting Agenda IGTF All Hands meeting & EUGridPMA 38, 19-21 Sept 2016, Geneva https://www.eugridpma.org/meetings/2016-09/ EUGridPMA 39, Jan 30th – Feb 1st 2017, Florence EUGridPMA 40, May 2017, Ljubljana