Andrew Prout, William Arcand, David Bestor, Chansup Byun, Bill Bergeron, Matthew Hubbell, Jeremy Kepner, Peter Michaleas, Julie Mullen, Albert Reuther,

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
MyProxy: A Multi-Purpose Grid Authentication Service
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
Secure Lync mobile Authentication
High Performance Computing Course Notes Grid Computing.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Chansup Byun, William Arcand, David Bestor, Bill Bergeron, Matthew Hubbell, Jeremy Kepner, Andrew McCabe, Peter Michaleas, Julie Mullen, David O’Gwynn,
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Understanding Active Directory
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Using Digital Credentials On The World-Wide Web M. Winslett.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Slide-1 Portal DR&E LLGrid Portal Interactive Supercomputing for DoD Albert Reuther, William Arcand, Chansup Byun, Bill Bergeron, Matthew Hubbell, Jeremy.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter 10: Authentication Guide to Computer Network Security.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
KX509: Leveraging Kerberos to Obtain Digital Certificates for Web Client Authentication University of Michigan Kevin Coffman Bill Doster.
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Using Encryption with Microsoft SQL Server 2000 Kevin McDonnell Technical Lead SQL Server Support Microsoft Corporation.
Building Security into Your System Bill Major Gregory Ponto.
Single Sign-On
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
The Distribution Online Vending Pilot Project Demo Testing Certificate Management Kennedy P Subramoney 23 July 2004.
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Grid technology Security issues Andrey Nifatov A hacker.
Web Services Security Patterns Alex Mackman CM Group Ltd
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Lemon security. Previous security enhancements user lemon: lemon-db-admin-OraMon will create user lemon (Miro). - OraMon switches to user lemon at its.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Authentication Celia Li Computer Science and Engineering York University.
Basharat Institute of Higher Education
Grid Computing.
CS691 M2009 Semester Project PHILIP HUYNH
Parallel Processing in ROSA II
Server-to-Client Remote Access and DirectAccess
Chapter 2: System Structures
Public Key Infrastructure from the Most Trusted Name in e-Security
Building Security into Your System
Presentation transcript:

Andrew Prout, William Arcand, David Bestor, Chansup Byun, Bill Bergeron, Matthew Hubbell, Jeremy Kepner, Peter Michaleas, Julie Mullen, Albert Reuther, Antonio Rosa 2012 IEEE High Performance Extreme Computing Conference September 2012 Scalable Cryptographic Authentication for High Performance Computing This work is sponsored by the Department of the Air Force under Air Force contract FA C Opinions, interpretations, conclusions and recommendations are those of the author and are not necessarily endorsed by the United States Government.

HPEC AJP 9/12/2012 What is the LLGrid The Problem: External services authentication The Solution: Cryptographic authentication Results Outline

HPEC AJP 9/12/2012 LLGrid is a ~500 user ~2000 processor system World’s only desktop interactive supercomputer –Dramatically easier to use than any other supercomputer –Highest fraction of staff using (20%) supercomputing of any organization on the planet Foundation of Supercomputing in Massachusetts LLGrid System Architecture LAN Switch Network Storage Resource Manager Configuration Server Compute Nodes Service Nodes Cluster Switch To Lincoln LAN Users LLAN

HPEC AJP 9/12/2012 All jobs run on LLGrid LLGrid Usage Total Job duration (seconds) M Classic Supercomputing Interactive Supercomputing Processors used by Job TX-2500 (952 Cores) TX-X (220 Cores) TX-3d (540 Cores) TX-2500 (952 Cores) TX-X (220 Cores) TX-3d (540 Cores) Desktop Computing –CPU-time <20 minutes Classic Supercomputing – Wall-clock time >3 hours Interactive Supercomputing –Between desktop and classic supercomputing –Shortens the “time to insight” –Ten development turns/day instead of one turn/week Desktop Computing –CPU-time <20 minutes Classic Supercomputing – Wall-clock time >3 hours Interactive Supercomputing –Between desktop and classic supercomputing –Shortens the “time to insight” –Ten development turns/day instead of one turn/week Desktop Computing

HPEC AJP 9/12/2012 What is the LLGrid The Problem: External services authentication The Solution: Cryptographic authentication Results Outline

HPEC AJP 9/12/2012 As the line between a shared supercomputer and a “really powerful personal computer” blurs, users expect to have access to network resources (storage, svn, cvs, etc). Challenges with Interactive Supercomputing Challenge: Users expect seamless access to other network resources from the HPC.

HPEC AJP 9/12/2012 However these commands raise security concerns. –They store passwords as plain-text on the HPC central storage. –Password synchronization has made this password very sensitive. Challenges with Interactive Supercomputing Challenge: Ensure seamless access without putting the user’s “one common password” at risk. “S3cr3t”

HPEC AJP 9/12/2012 What is the LLGrid The Problem: External services authentication The Solution: Cryptographic authentication Results Outline

HPEC AJP 9/12/2012 Cryptographic authentication of clients using X509 PKI certificates has long been part of the SSL and TLS standards. The root of trust will certify that a specific keypair belongs to a specific user or process. Cryptographic Authentication User Server

HPEC AJP 9/12/2012 Cryptographic authentication of clients using X509 PKI certificates has long been part of the SSL and TLS standards. The root of trust will certify that a specific keypair belongs to a specific user or process. Cryptographic Authentication User Server Connection Request

HPEC AJP 9/12/2012 Cryptographic authentication of clients using X509 PKI certificates has long been part of the SSL and TLS standards. The root of trust will certify that a specific keypair belongs to a specific user or process. Cryptographic Authentication User Server Connection Request Authentication Request A

HPEC AJP 9/12/2012 Cryptographic authentication of clients using X509 PKI certificates has long been part of the SSL and TLS standards. The root of trust will certify that a specific keypair belongs to a specific user or process. Cryptographic Authentication User Server Connection Request Authentication Request A A

HPEC AJP 9/12/2012 Cryptographic authentication of clients using X509 PKI certificates has long been part of the SSL and TLS standards. The root of trust will certify that a specific keypair belongs to a specific user or process. Cryptographic Authentication User Server Connection Request Authentication Request Signed Authentication Response and copy of PKI certificate A A

HPEC AJP 9/12/2012 Cryptographic authentication of clients using X509 PKI certificates has long been part of the SSL and TLS standards. The root of trust will certify that a specific keypair belongs to a specific user or process. Cryptographic Authentication User Server Connection Request Authentication Request Signed Authentication Response and copy of PKI certificate A AA

HPEC AJP 9/12/2012 Cryptographic authentication of clients using X509 PKI certificates has long been part of the SSL and TLS standards. The root of trust will certify that a specific keypair belongs to a specific user or process. Cryptographic Authentication User Server Connection Request Authentication Request Signed Authentication Response and copy of PKI certificate A AA Access Granted: Welcome Andy!

HPEC AJP 9/12/2012 Cryptographic authentication depends on both the security of the user’s private key and access to it. –Storing the private key on central storage is little different than storing a user’s password. Challenges with Cryptographic Authentication Challenge: Where to store the private key?

HPEC AJP 9/12/2012 Cryptographic authentication depends on both the security of the user’s private key and access to it. –Storing the private key on central storage is little different than storing a user’s password. Challenges with Cryptographic Authentication No guarantee the key won’t be lost, copied or left unprotected.

HPEC AJP 9/12/2012 One traditional solution is to store the key on the client system and forward authentication requests back to the user’s system. –Could be on the client system or in a smart card. Challenges with Cryptographic Authentication

HPEC AJP 9/12/2012 Challenges with Cryptographic Authentication Forwarding requests back doesn’t work for semi-interactive computing or background jobs. Forwarding requests back doesn’t work for semi-interactive computing or background jobs. Poof! One traditional solution is to store the key on the client system and forward authentication requests back to the user’s system. –However this fails if the user disconnects from the HPC.

HPEC AJP 9/12/2012 Challenges with Cryptographic Authentication Poof! Connecting smart cards to the HPC is not practical. –Some network-attached key storage devices exist, but their practical benefit in this scenario is questionable.

HPEC AJP 9/12/2012 Challenges with Cryptographic Authentication Poof! We implemented a virtual smart card to run on each node. –Allows for keys to be used on any node, connected or disconnected. –Allows for different keys on each node.

HPEC AJP 9/12/2012 Uses the smart card communication API: PKCS#11. Authenticates users and allows authorized users to perform cryptographic operations. Protects private keys from being copied, even by authorized users of the key. High throughput capability & low latency. –Physical smart cards have a latency approximately ms. Virtual Smart Card Defined

HPEC AJP 9/12/2012 We created the keyd daemon to be the brains of our virtual smartcard. –Runs as it’s own user account. The keyd Daemon: A Virtual Smartcard Keyd

HPEC AJP 9/12/2012 We created the keyd daemon to be the brains of our virtual smartcard. –Runs as it’s own user account. –Has access to all the keys. The keyd Daemon: A Virtual Smartcard Keyd

HPEC AJP 9/12/2012 We created the keyd daemon to be the brains of our virtual smartcard. –Runs as it’s own user account. –Has access to all the keys. We then created a library that conformed to the PKCS#11 standard and could talk to this daemon. –Loaded by applications running as a HPC user. The keyd Daemon: A Virtual Smartcard Keyd PKCS#11

HPEC AJP 9/12/2012 We created the keyd daemon to be the brains of our virtual smartcard. –Runs as it’s own user account. –Has access to all the keys. We then created a library that conformed to the PKCS#11 standard and could talk to this daemon. –Loaded by applications running as a HPC user. –Connects through a unix socket. –User credentials passed through the socket  Secure, provided you trust your linux kernel. The keyd Daemon: A Virtual Smartcard Keyd PKCS#11

HPEC AJP 9/12/2012 We created the keyd daemon to be the brains of our virtual smartcard. –Runs as it’s own user account. –Has access to all the keys. We then created a library that conformed to the PKCS#11 standard and could talk to this daemon. –Loaded by applications running as a HPC user. –Connects through a unix socket. –User credentials passed through the socket  Secure, provided you trust your linux kernel. The SVN client can then load the PKCS#11 library and use the keys to authenticate to the SVN server. The keyd Daemon: A Virtual Smartcard Keyd PKCS#11

HPEC AJP 9/12/2012 We created the keyd daemon to be the brains of our virtual smartcard. –Runs as it’s own user account. –Has access to all the keys. We then created a library that conformed to the PKCS#11 standard and could talk to this daemon. –Loaded by applications running as a HPC user. –Connects through a unix socket. –User credentials passed through the socket  Secure, provided you trust your linux kernel. The SVN client can then load the PKCS#11 library and use the keys to authenticate to the SVN server. –Other applications can be enabled in the future. The keyd Daemon: A Virtual Smartcard Keyd PKCS#11

HPEC AJP 9/12/2012 The SVN server was configured to accept the LLGrid’s root of trust. The SVN client on the LLGrid was configured to load the keyd daemon PKCS#11 library. –One configuration entry: ssl-pkcs11-provider=libkeyd_pkcs11 Configuring SVN for TLS Client Auth SVN User SVN Server Connection Request Authentication Request Signed Authentication Response and copy of PKI certificate A AA Keyd Daemon

HPEC AJP 9/12/2012 What is the LLGrid The Problem: External services authentication The Solution: Cryptographic authentication Results Outline

HPEC AJP 9/12/2012 Keypair generation and X509 PKI certificate creation is performed during user account creation. –LLGrid Adminstrators act as the root of trust. We developed scripts that execute parallel key generation across nodes in the cluster. X509 PKI Certificate Enrollment Nodes Time (seconds) Keypair & Certificate Generation –Each certificate asserts both the user identity and the node identity to meet the guidelines to be used for either server or client TLS authentication.

HPEC AJP 9/12/2012 Created a general purpose key storage and certificate management solution for HPC. –Keys are not managed by the end-user, ensuring a low risk of compromise requiring revocation. Demonstrated that it can be used to enable single sign-on integration to systems outside of the HPC. –Mitigated security concerns over passwords being stored on the LLGrid central storage. –Avoided the issue of periodic password changes impacting batch processing. Results

HPEC AJP 9/12/2012 Future work will look to use these PKI certificates to secure inter-node web services communication. –Certificates are valid for both TLS client or server authentication. Future Work

HPEC AJP 9/12/2012 Questions?