Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Introduction of Grid Security
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Grid Security. Typical Grid Scenario Users Resources.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Security NeSC Training Team International Summer School for Grid Computing, Vico Equense,
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
INFSO-RI Enabling Grids for E-sciencE Security, Authorisation and Authentication Mike Mineter Training, Outreach and Education National.
Grid Security Overview The Globus Project™ Copyright (c) 2002 University of Chicago and The University of Southern California. All.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security Management.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cryptography 101 Frank Hecker
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Basics for the User Guy Warner NeSC Training Team An Induction to EGEE for GOSC.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Unit 1: Protection and Security for Grid Computing Part 2
INFSO-RI Enabling Grids for E-sciencE Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
1 Grid Security. 2 Grid Security Concerns Control access to shared services –Address autonomous management, e.g., different policy in different work groups.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
INFSO-RI Enabling Grids for E-sciencE Sofia, 22 March 2007 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
King Mongkut’s University of Technology Faculty of Information Technology Network Security Prof. Reuven Aviv 6. Public Key Infrastructure Prof. R. Aviv,
Security, Authorisation and Authentication.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Grid Security: PKI Based Authentication Infrastructure M.Effatparvar Fall 1391.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
Security, Authorisation and Authentication Mike Mineter, Guy Warner Training, Outreach and Education National e-Science Centre
EGEE is a project funded by the European Union CA overview and requirements Ognjen Prnjat, Nikos Vogiatzis GRNET EGEE-SEE regional kick-off, April 7-8.
1 Grid Security: PKI Based Authentication Infrastructure M.Effatparvar Fall 1391.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Mike Mineter, National e-Science Centre.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Emidio Giorgio INFN Catania.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
The Secure Sockets Layer (SSL) Protocol
Grid Security.
e-Health Platform End 2 End encryption
Grid School Module 4: Grid Security
The Secure Sockets Layer (SSL) Protocol
Grid Security Overview
Grid Security Infrastructure
PKI (Public Key Infrastructure)
Presentation transcript:

Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory

Contents l Cryptography Overview l Public Key Infrastructure (PKI) Overview l Secure Socket Layer (SSL) Overview l Grid Security Infrastructure (GSI) Overview

Cryptography Overview l Keys, Encryption and Decryption –Symmetric and Asymmetric –Public and Private keys l Digital Signatures –Secure hashes

Keys l A key can be thought of as simply a collection of bits l The more bits, the stronger the key l Keys are tied to specific encryption algorithms l Lengths vary depending on the encryption algorithm –e.g. 128 bits is long for some algorithms, but short for others

Encryption l Encryption is the process of taking some data and a key and feeding it into a function and getting encrypted data out l Encrypted data is, in principal, unreadable unless decrypted Encryption Function

Decryption l Decryption is the process of taking encrypted data and a key and feeding it into a function and getting out the original data –Encryption and decryption functions are linked Decryption Function

Symmetric Encryption l Encryption and decryption functions that use the same key are called symmetric –In this case everyone wanting to read encrypted data must share the same key l DES is an example of symmetric encryption Encrypt Decrypt

Asymmetric Encryption l Encryption and decryption functions that use a key pair are called asymmetric –Keys are mathematically linked l RSA is an example of asymmetric encryption

Asymmetric Encryption l When data is encrypted with one key, the other key must be used to decrypt the data –And vice versa Encrypt Decrypt Encrypt

Public and Private Keys l With asymmetric encryption each user can be assigned a key pair: a private and public key Private key is known only to owner Public key is given away to the world

Public and Private keys l Anything encrypted with the private key can only be decrypted with the public key l And vice versa l Since the private key is known only to the owner, this is very powerful… Encrypt Decrypt

Digital Signatures l Digital signatures allow the world to verify I created a hunk of data –e.g. , code

Digital Signatures l Digital signatures are created by encrypting a hash of the data with my private key l The resulting encrypted data is the signature l This hash can then only be decrypted by my public key Hash Encrypt

Digital Signature l Given some data with my signature, if you decrypt a signature with my public key and get the hash of the data, you know it was encrypted with my private key Hash =? Decrypt

Digital Signature l Since I’m the only one with access to my private key, you know I signed the hash and the data associated with it l But, how do you know that you have my correct public key? l Answer: A Public Key Infrastructure… ?

Contents l Cryptography Overview l Public Key Infrastructure (PKI) Overview l Secure Socket Layer (SSL) Overview l Grid Security Infrastructure (GSI) Overview

Public Key Infrastructure (PKI) l PKI allows you to know that a given public key belongs to a given user l PKI builds off of asymmetric encryption: –Each entity has two keys: public and private –The private key is known only to the entity l The public key is given to the world encapsulated in a X.509 certificate Owner

Public Key Infrastructure (PKI) Overview l X.509 Certificates l Certificate Authorities (CAs) l Certificate Policies –Namespaces l Requesting a certificate –Certificate Request –Registration Authority Owner

Certificates l A X.509 certificate binds a public key to a name l It includes a name and a public key (among other things) bundled together and signed by a trusted party (Issuer) Name Issuer Public Key Signature

John Doe 755 E. Woodlawn Urbana IL BD Male 6’0” 200lbs GRN Eyes State of Illinois Seal Certificates l Similar to passport or driver’s license Name Issuer Public Key Signature

Certificates l By checking the signature, one can determine that a public key belongs to a given user. Name Issuer Public Key Signature Hash =? Decrypt Public Key from Issuer

Certificates l Question: Who signs certificates? l Answer: A small set of trusted entities known as Certificate Authorities (CAs) Issuer? Name Public Key

Certificate Authorities (CAs) l A Certificate Authority is an entity that exists only to sign user certificates l The CA signs it’s own certificate which is distributed in a trusted manner Name: CA Issuer: CA CA’s Public Key CA’s Signature

Certificate Authorities (CAs) l The public key from the CA certificate can then be used to verify other certificates Name Issuer Public Key Signature Hash =? Decrypt Name: CA Issuer: CA CA’s Public Key CA’s Signature

Certificate Policy (CP) l Each CA has a Certificate Policy (CA) which states when and how a CA issues certificates. l It states who it will issue certificates for –Just like the State of Illinois only issues driver’s licenses’ for residents of the state of Illinois –A CA for a grid typically only issues certificates for folks that are already approved to use resources on the grid

Certificate Policy (CP) l A CA’s CP states how it identifies the people it issues certificates to –Similar to having to show a birth certificate to get a driver’s license –Some CA’s are very stringent and require similar proof of identity –Others are lenient and only require proof via

Namespaces l Each CA’s Certificate Policy also states the namespace of certificates issued by the CA l A namespace is a hierarchy similar to the hierarchy used for Internet hostnames Grid Globus mcs.anl.gov Von Welch NASA LBNL Root Top-level organizations Organizational Units Entity uiuc.edu

Namespaces l Each CA constrains itself to signing certificates that are in a namespace that are a portion of the overall space –E.g. the Globus CA signs certificates only under the Globus organization Grid Globus mcs.anl.gov Von Welch NASA LBNL uiuc.edu

Requesting a Certificate l To request a certificate a user starts by generating a key pair

Certificate Request l The user then signs their own public key to form what is called a Certificate Request Sign Certificate Request Public Key

Registration Authority (RA) l The user then takes the certificate to a Registration Authority (RA) l A RA’s responsibility is to verify the user’s name l Often the RA coexists with the CA and is not apparent to the user Certificate Request Public Key ID

Certificate Issuance l The CA then takes the identity from the RA and the public key from the certificate request l It then creates, signs and issues a certificate for the user Certificate Request Public Key Name Issuer Public Key Signature Name

Contents l Cryptography Overview l Public Key Infrastructure (PKI) Overview l Secure Socket Layer (SSL) Overview l Grid Security Infrastructure (GSI) Overview

Secure Socket Layer (SSL) l Protocol above a standard TCP/IP socket to provide security in the forms of: –Authentication –Message protection >Confidentiality >Integrity

SSL Authentication l Start by exchanging X.509 certificates l Each side then sends over a challenges l Challenge is signed with private key and sent back over Sign

SSL Authentication l Each side then verifies certificate using PKI and signature using certificate l If everything checks then the identity from the certificate can be trusted CA Check Certificate Check Signature

SSL Message Protection l After authentication a shared session key is established to be used for message protection l Confidentiality == Encryption of messages to prevent eavesdropping l Integrity == Signing of messages to prevent modification Encrypt Sign Message

Contents l Cryptography Overview l Public Key Infrastructure (PKI) Overview l Secure Socket Layer (SSL) Overview l Grid Security Infrastructure (GSI) Overview

Globus Security: The Grid Security Infrastructure l The Grid Security Infrastructure (GSI) is a set of tools, libraries and protocols used in Globus to allow users and applications to securely access resources. l Based on a public key infrastructure, with certificate authorities and X509 certificates

GSI l Uses SSL for authentication and message protection l Adds features needed for Single-Sign on –Proxy Credentials –Delegation

GSI: Credentials l In the GSI system each user has a set of credentials they use to prove their identity on the grid –Consists of a X509 certificate and private key l Long-term private key is kept encrypted with a pass phrase –Good for security, inconvenient for repeated usage

GSI: Single Sign-on l Single-sign on is important feature for Grid Applications –Enables easy coordination of multiple resources –User authenticates themselves once, then can perform multiple actions without reauthentication –Can allow processes to act on their behalf

GSI: Single Sign-on l To support single sign-on GSI adds the following functionality to SSL: –Proxy credentials –Credential delegation

GSI: Proxy Credentials l Proxy credentials are short-lived credentials created by user –Short term binding of user’s identity to alternate private key –Stored unencrypted for easy repeated access –Short lifetime in case of theft –Enables user to authenticate once then perform multiple actions without reauthenticating

GSI: Delegation l GSI enables user to create and delegate proxy credentials to processes running on remote resources l Allows remote processes and resources to act on user’s behalf l Important for complex applications that need to use Grid resources –E.g. jobs that needs to access data storage

Summary l GSI is: –X.509 Certificates for authentication –PKI for verifying identities in Certificates –SSL as the protocol for authentication, confidentiality and integrity –Proxy certificates and delegation to support single sign-on