Security in OSG Rob Quick

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
OSG AuthZ Architecture AuthZ Components Legend VO Management Services Grid Site GUMS Site Services SAZ CE Gatekeeper Prima Is Auth? Yes / No SE SRM gPlazma.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Grid Security. Typical Grid Scenario Users Resources.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Security Issues in Physics Grid Computing Ian Stokes-Rees OeSC Security Working Group 14 June 2005.
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
OSG End User Tools Overview OSG Grid school – March 19, 2009 Marco Mambelli - University of Chicago A brief summary about the system.
OSG Site Provide one or more of the following capabilities: – access to local computational resources using a batch queue – interactive access to local.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
1 Grid Security. 2 Grid Security Concerns Control access to shared services –Address autonomous management, e.g., different policy in different work groups.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
E-science grid facility for Europe and Latin America E2GRIS1 Raúl Priego Martínez – CETA-CIEMAT (Spain)‏ Itacuruça (Brazil), 2-15 November.
Military Technical Academy Bucharest, 2004 GETTING ACCESS TO THE GRID Authentication, Authorization and Delegation ADINA RIPOSAN Applied Information Technology.
Hao Wang Computer Sciences Department University of Wisconsin-Madison Authentication and Authorization.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Condor-G A Quick Introduction Alan De Smet Condor Project University of Wisconsin - Madison.
WP3 Authorization and R-GMA Linda Cornwall WP3 workshop 2-4 April 2003.
Kerberos Guilin Wang School of Computer Science 03 Dec
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Ian D. Alderman Computer Sciences Department University of Wisconsin-Madison Condor Week 2008 End-to-end.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
HTCondor Security Basics HTCondor Week, Madison 2016 Zach Miller Center for High Throughput Computing Department of Computer Sciences.
Storage Element Security Jens G Jensen, WP5 Barcelona, May 2003.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
Bringing Federated Identity to Grid Computing Dave Dykstra CISRC16 April 6, 2016.
How to get the needed computing Tuesday afternoon, 1:30pm Igor Sfiligoi Leader of the OSG Glidein Factory Operations University of California San Diego.
Introduction to Distributed HTC and overlay systems Tuesday morning, 9:00am Igor Sfiligoi Leader of the OSG Glidein Factory Operations University of California.
Introduction to the Grid and the glideinWMS architecture Tuesday morning, 11:15am Igor Sfiligoi Leader of the OSG Glidein Factory Operations University.
UCS D OSG Summer School 2011 Intro to DHTC OSG Summer School An introduction to Distributed High-Throughput Computing with emphasis on Grid computing.
UCS D OSG Summer School 2011 Single sign-on OSG Summer School Single sign-on in Open Science Grid by Igor Sfiligoi University of California San Diego.
Security in OSG Tuesday afternoon, 4:15pm Igor Sfiligoi Member of the OSG Security team University of California San Diego.
(Exchange Programme to advance e-Infrastructure Know-How) The EPIKH Project Hailong Yang
Key management issues in PGP
Grid Computing Security Mechanisms: the state-of-the-art
Authentication, Authorisation and Security
OGF PGI – EDGI Security Use Case and Requirements
HTCondor Security Basics
Grid Security.
R-GMA Security Principles and Plans
EGEE VO Management.
Outline What does the OS protect? Authentication for operating systems
Certificates An increasingly popular form of authentication
Grid Security Jinny Chien Academia Sinica Grid Computing.
Artem Trunov and EKP team EPK – Uni Karlsruhe
THE STEPS TO MANAGE THE GRID
Building Grids with Condor
Outline What does the OS protect? Authentication for operating systems
Update on EDG Security (VOMS)
E-cert (Digital Certificate)
HTCondor Security Basics HTCondor Week, Madison 2016
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Computer Security Distributed System Security
O. Otenko PERMIS Project Salford University © 2002
Protocol ap1.0: Alice says “I am Alice”
Certificates An increasingly popular form of authentication
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Chapter 8 roadmap 8.1 What is network security?
Presentation transcript:

Security in OSG Rob Quick <rquick@iu.edu> OSG Operations Coordinator Manager High Throughput Computing Group Indiana University Slides By Igor Sfiligoi

Logistical reminder It is OK to ask questions During the lecture During the demos During the exercises During the breaks If I don't know the answer, I will find someone who likely does

Reminder – Single sign-on The user should use the same mechanism to submit jobs to any site And there are 100s of them in OSG Hi. I am Rob Hi. I am Rob Hi. I am Rob

Passwords a non-starter We all know username/password is the preferred authentication mechanism Almost everybody use it! But not a good solution for distributed systems Uses a shared secret between the user and the service provider And secrets stay secret only if few entities know it Sharing passwords between sites a bad idea!

Adding an intermediary A better approach is to introduce a highly trusted intermediary Have been used in real life for ages e.g. States as issuers of IDs/Passports Getting the ID can be a lengthy process, but using it is easy afterwards Hi. I am Rob Use this ID Hi. Here is my ID Hi. Here is my ID Hi. Here is my ID

Adding an intermediary A better approach is to introduce a highly trusted intermediary Have been used in real life for ages e.g. States as issuers of Ids/Passports Getting the ID can be a lengthy process, but using it is easy afterwards Chain of trust. You are trusted because the site trusts the issuer, and the issuer trusted you. Hi. I am Rob Use this ID Hi. Here is my ID Hi. Here is my ID Hi. Here is my ID

Technical implementations Many technical solutions x.509 PKI Kerberos OpenID many more... All based on the same basic principle Each has strengths and weaknesses OSG standardized on x.509 Will not argue if it is the best one.

You should have one by now. x.509 PKI Based on public key cryptography A user has a (private,public) key pair One signs, the other verifies The highly trusted entity is called a Certification Authority (CA) The user is given a certificate Cert. has user name in it Cert. also contains the (priv,pub) key pair Cert. has a limited lifetime Cert. is signed by the CA private key You should have one by now.

Sites have CA public key pre-installed x.509 authentication Sites have CA public key pre-installed User authenticates by signing a site provided string and providing the public part of the cert Rob's Pub Cert Hi, here is my pub cert Please sign “10011011” Here it is “00111011” Hi, Rob CA pub Associated Private Key

Mutual authentication The OSG clients also require servers to authenticate Same principle as before The site's server owns a x.509 certificate User client must have the CA pre- installed So we have mutual authentication

Sometimes your jobs need to impersonate you Impersonation Sometimes your jobs need to impersonate you For example to access remote data CE Scheduler Hi... ehm... I am Rob SE Job Storage Element

Sometimes your jobs need to impersonate you Impersonation Sometimes your jobs need to impersonate you For example to access remote data Obviously will not work. The job does not have your private key. CE We have similar problems in real life, too e.g. attorney representing you in court Nobody will buy it that he is you, yet he can speak on your behalf Scheduler Hi... ehm... I am Rob SE Job Storage Element

The job is indeed not you Create a proxy certificate for the job Proxy delegation The job is indeed not you Create a proxy certificate for the job Add another level of trust delegation And send it with the job CE Scheduler Hi... I am Rob SE Job Storage Element

proxy's private key to the WN. Proxy delegation The job is indeed not you Create a proxy certificate for the job Add another level of trust delegation And send it with the job YES! You are sending the proxy's private key to the WN. CE Scheduler Hi... I am Rob SE Job Storage Element

But we don't have anything better. Risk mitigation Proxy delegation is risky Your proxy could be stolen In OSG, we mitigate by limiting lifetime At most few hours recommended After the proxy expires, the proxy is useless Can be annoying Must keep renewing, if long running job! But we don't have anything better.

Proxy delegation is risky Your proxy could be stolen Risk mitigation Proxy delegation is risky Your proxy could be stolen In OSG, we mitigate by limiting lifetime At most few hours recommended After the proxy expires, the proxy is useless Can be annoying Must keep renewing, if long running job! If using glideinWMS, Condor will automatically create a short lived proxy and keep re-delegating it. Completely transparent to you. But we don't have anything better.

x.509 in Overlay systems x.509 is typically used in Overlay systems as well For glideinWMS, all communication between processes is mutually authenticated using x.509 (proxy) certificates

Authentication vs. Authorization Just because you can authenticate yourself, it does not mean you are authorized, too e.g. your passport tells who you are, but does not allow you to drive a car x.509 PKI only covers authentication Tells the site who you are Need a different mechanism for authorization

Per-user authorization not an option The naive approach is using a list Since we do not want let just anyone in! However, the problem is scale OSG has ~10,000 users! Sites do not want to decide on a user-by-user basis! Server authorization is easy. Just require host name in the certificate name; CA will enforce this. The client decides which host to talk to.

Adding roles Sites want to operate on higher level concepts Some kind of attribute Like in real life Think about passport vs driver's license Both tell a cop who you are (and to 1st approx. are issued by the same entity) But the driver's license tells him you are allowed to use a car, too “Class:C”

Need for an attribute authority Users can have many roles But don't want to have multiple certs e.g. I may be running HEP jobs or School jobs So the attributes cannot come from the CA And you would not just trust the user In OSG, we use VOMS Virtual Organization Management System OSG expects well organized VOs (e.g. CMS)

VO decides who is worthy of an attribute VO and VOMS VO decides who is worthy of an attribute Site decides based on that attribute Register VOMS Get proxy+attrs Hi. I work for CMS Hi. I am Rob Use this ID Hi. Here is my ID Hi. Here is my ID Hi. Here is my ID

VO decides who is worthy of an attribute VO and VOMS VO decides who is worthy of an attribute Site decides based on that attribute Site still knows who you are and can act on your name alone. But they will do it only for exceptional cases. Register VOMS Get proxy+attrs Hi. I work for CMS Hi. I am Rob Use this ID Hi. Here is my ID Hi. Here is my ID Hi. Here is my ID

More security considerations There is much more than authentication and authorization to security But we don't have the time to cover everything Just briefly Sharing of resources Privacy Acceptable conduct

Sharing of resources Modern CPUs are many-core, so Very likely your job will be sharing the node with other jobs Sites will map your Grid name into UID Hopefully unique... be sure to ask Standard *NIX protections Act accordingly e.g. no file should be world writable

Privacy By default, no privacy in OSG Assume all your files are publicly readable Apart from your proxy If you need privacy, you will have to take explicit measures Both during network transfers, and For files on disk x.509 can be used for encryption But remember, proxy has new keys

Each OSG user is bound by its AUP (Acceptable User Policy) Acceptable conduct Each OSG user is bound by its AUP (Acceptable User Policy) And sites are allowed to have additional rules in place In a nutshell Use only for the declared science purpose Do not overload the system Do not attempt to circumvent security Else, you will be banned!

Feel free to ask me questions later: Rob Quick <rquick@iu.edu> Questions? Comments? Feel free to ask me questions later: Rob Quick <rquick@iu.edu> 28