IGTF and SHA-2 David Kelsey TAGPMA meeting, SDSC Feb 2012.

Slides:



Advertisements
Similar presentations
Usage of PGP in TACAR 19th OGF Meeting Chapel Hill, USA February 1, 2007 Licia Florio Project Development Officer
Advertisements

Template Profile Jens Jensen, STFC RAL GridNet2/ UK e-Science CA OGF22 Boston.
Lim Sei cK.  Information!  What information is expected in a progress report?  The answer to this question depends, as you might expect, on the.
Or………..  How to Vote for The Count!  Eight Forms of Voting  Unanimous Consent  Voice Vote  Rising Vote  Show of Hands  Ballot  Roll Call  By.
Load Rebalancing for Distributed File Systems in Clouds Hung-Chang Hsiao, Member, IEEE Computer Society, Hsueh-Yi Chung, Haiying Shen, Member, IEEE, and.
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
RPKI Validation - Revisited draft-huston-rpki-validation-01.txt Geoff Huston George Michaelson APNIC Slide 1/19.
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
SHA (secure hash algorithm) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
CVE , lessons learned and actions David Groep, Nov 7 nd, 2008.
Answering an Essay Style Question. Structuring An Essay 1.(Beginning) introduction Here you set out by defining the key words in the title and set out.
Status Update for Algorithm Transition for the RPKI (draft-ietf-sidr-algorithm-agility) Steve Kent Roque Gagliano Sean Turner.
This chapter is extracted from Sommerville’s slides. Text book chapter
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 10: Testing and Inspecting to Ensure High Quality Part 4:
REVIEW OF NA61 SOFTWRE UPGRADE PROPOSAL. Mandate The NA61 experiment is contemplating to rewrite its fortran software in modern technology and are requesting.
©Ian Sommerville 2000, Mejia-Alvarez 2009 Slide 1 Software Processes l Coherent sets of activities for specifying, designing, implementing and testing.
Z26 Project Management Introduction lecture 1 13 th January 2005
1 Designing the Architecture CSSE 477 Software Architecture Steve Chenoweth, Rose-Hulman Institute Week 3, Day 1, Monday, September 19, 2011.
The CA Distribution Process David Groep, July 2007.
EUGridPMA CAOPS-WG and IGTF Issues June 2012 Delft, NL David Groep, Nikhef, EUGridPMA, EGI and BiG Grid.
The IPC development plan for the next five years IPC Workshop February 2013 Geneva Antonios Farassopoulos Director, International Classifications and Standards.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
Network Security7-1 CIS3360: Chapter 8: Cryptography Application of Public Cryptography Cliff Zou Spring 2012 TexPoint fonts used in EMF. Read the TexPoint.
Assessing the influence on processes when evolving the software architecture By Larsson S, Wall A, Wallin P Parul Patel.
Node Lookup in P2P Networks. Node lookup in p2p networks In a p2p network, each node may provide some kind of service for other nodes and also will ask.
Rob Quick OSG Operations Area Coordinator Manager High Throughput Computing Indiana University Integrating OSG Operational Services Rob Quick OSG Operations.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan Presented.
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
Lecture 4.2: Hash Functions: Design* CS 436/636/736 Spring 2012 Nitesh Saxena * some slides borrowed from Gene Tsudik.
Lecture 2: Introduction to Cryptography
English Language Services
Distribution Repository Structure David Groep,
Azam Supervisor : Prof. Raj Jain
EGI-InSPIRE RI EGI.eu European Grid Infrastructure EGI-InSPIRE RI Credential Validation Middleware Requests compiling.
Status review and pending issues March 13, 2012 Oxford, UK David Groep, Nikhef, EUGridPMA, EGI and BiG Grid participation supported by IGE, the Initiative.
Lessons Learned from disaster recovery Jinny Chien April 20, th APGridPMA in Taipei.
NRENs, Grids and Integrated AAI In Search For the Utopian Solution Christos Kanellopoulos AUTH/GRNET October 17 th, 2005 skanct at physics.auth.gr 2nd.
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Design Guidelines Thursday July 26, 2007 Bernard Aboba IETF 69 Chicago, IL.
Federated Identity Management for Scientific Collaborations The Common Vision David Kelsey (STFC) 3 Nov 2011.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 02/13/2012.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
CMS: T1 Disk/Tape separation Nicolò Magini, CERN IT/SDC Oliver Gutsche, FNAL November 11 th 2013.
Plans for D7.7 The Security Report on the Final Project Release Linda Cornwall, RAL.
Slides for Selling Sustainability* *for CM305 Final Projects.
© 2007 Open Grid Forum CAOPS-WG RP Namespace Constraints Policy David Groep CAOPS-WG OGF20 May 8 th, 2007.
EUGridPMA Status Review … and proposals February 28, 2012 Taipei, TW David Groep, Nikhef, EUGridPMA, EGI and BiG Grid.
CTMS Workspace Meeting caBIG ® Clinical Trials Management Systems Workspace January 27, 2009.
Normalisation Unit 6: Databases. Just to recap  What is an Entity  What is an Attribute?
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Introduction of SHA-2 in the EGI Infrastructure David Groep, EGI-IGTF Liaison.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Updates of APGrid PMA 18 th EUGridPMA Meeting 18 th EUGridPMA Meeting 18 January, 2010 Eric Yen ASGCCA Taiwan.
Updates from the EUGridPMA David Groep, Oct 17 st, 2007.
IGTF Risk Assessment Team 5/11/091.
ALICE WLCG operations report Maarten Litmaath CERN IT-SDC ALICE T1-T2 Workshop Torino Feb 23, 2015 v1.2.
IGTF Risk Assessment Team 9/14/091.
DOEGrids Audit Report Michael Helm 1 Networking for the Future of Science Energy Sciences Network Lawrence Berkeley National Laboratory 10 May 2009.
IGTF, WLCG, EGI and SHA-2 (and RFC proxies) David Kelsey (STFC-RAL and WLCG) TAGPMA meeting, Panama City Aug 2012.
Update on SHA-2 and RFC proxy support
Federated Identity Management for Scientific Collaborations
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
EUGridPMA Status Review … and proposals February 28, 2012 Taipei, TW
Thursday pilot session: 7-minutes
and the SHA-1 depreciation time line and status
Communications Ensuring a responsive IGTF community through periodic validation of communication co-supported by the Dutch National e-Infrastructure coordinated.
Presentation transcript:

IGTF and SHA-2 David Kelsey TAGPMA meeting, SDSC Feb 2012

WLCG status Firstly – see slides from Maarten Litmaath about WLCG situation. SHA-2 and RFC proxies Feb 2012SHA-2, TAGPMA2

Conclusion of discussion at EUGridPMA meeting Jan 2012 migrating to SHA2 appears to be non-trivial, since it is convoluted with a move to RFC3820 style proxy certs There is still a bit of software out there that does not support RFC3820 proxies, and using libraries that support SHA-2 would necessitate the exclusive use of RFC proxies So there is a deadlock here The presentation by DaveK (from Maarten Litmaath) explains the dependencies and some wLCG considerations on the time line Feb 20123SHA-2, TAGPMA

Conclusions (2) We understand the complications, but at the same time the risk of using SHA-1 is increasing as more cryptanalysis is done Basically, it would not be beneficial to subscribers or RPs to start using SHA-2 now, knowing that many things will break, and a new risk analysis is needed, taking the deployment risks into account But at the same time the RAT and IGTF must develop a "Plan-B" in case SHA-1 is suddenly broken and we need to move to SHA-2 anyway, regardless of other consequences Feb 20124SHA-2, TAGPMA

EUGridPMA proposal on SHA-2 With regards to the introduction of SHA-2 the PMA now proposes to the IGTF the following: the RAT does a risk assessment of staying with SHA-1, in light of current cryptanalytic developments and the deployment issues identified if SHA-1 is broken, the RAT makes an immediate assessment based on the integrity of the subscriber certs, and will act regardless of RP deployment consequences we will NOT repeat NOT recommend CAs to move to SHA-2 for production use until the risk assessment completes noting that this provision ends in January 2013 Feb 20125SHA-2, TAGPMA

Proposal (2) individual CAs MAY start issuing SHA-2 based certs on their own accord anyway (e.g. for testing, or to satisfy other needs) the date by which SHA-2 production certs may be issued will be NO LATER than January 2013 and it is likely we will RECOMMEND CAs to move then, since it will take another 395 days to get rid of SHA-1 in a reasonable way additional digest algorithms, in particular the successor to SHA-2 which is chosen this year, may ALSO be used in production certs in January 2013 but will NOT be introduced before SHA-2 is recommended for general use Feb 20126SHA-2, TAGPMA

Further notes Note that SHA-2 is a family, so all of SHA256, SHA384 or SHA512 may be encountered in production certs following this date! The NIST competition for a new hash algorithm (the successor of the SHA-2 family) is completing in half a year. The new hash family (let's call it "SHA-3") will be available in implementations by the end of this year. RPs may expect the use of SHA-3 based certs early 2013, although not before SHA-2 is released for general use We urge software developers to be flexible in the use of cryptography, rely on upgradable (dynamic) libraries and not tie to a specific hash, key algorithm or key size Feb 20127SHA-2, TAGPMA

One final note All CAs are kindly asked to stop using Address (or , or "E") attributes. Not only in subject names, but also in their issuer name. There are three CAs (IUCC, IHEP, APAC) that still have those There are no such CAs in TAGPMA(?) Feb 20128SHA-2, TAGPMA