Ian D. Alderman Computer Sciences Department University of Wisconsin-Madison Condor Week 2007 Signed.

Slides:



Advertisements
Similar presentations
IBM Software Group ® Design Thoughts for JDSL 2.0 Version 0.2.
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Enabling Secure Internet Access with ISA Server
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents Tomasz Müldner, Jodrey School of Computer Science, Acadia University, Wolfville,
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
A responsibility based model EDG CA Managers Meeting June 13, 2003.
Greg Quinn Computer Sciences Department University of Wisconsin-Madison Condor on Windows.
Military Technical Academy Bucharest, 2006 GRID SECURITY INFRASTRUCTURE (GSI) - Globus Toolkit - ADINA RIPOSAN Department of Applied Informatics.
Grid Security. Typical Grid Scenario Users Resources.
Malicious Logic What is malicious logic Types of malicious logic Defenses Computer Security: Art and Science © Matt Bishop.
Jaime Frey Computer Sciences Department University of Wisconsin-Madison Condor-G: A Case in Distributed.
SEE-GRID-SCI Hands-On Session: Workload Management System (WMS) Installation and Configuration Dusan Vudragovic Institute of Physics.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
GRID workload management system and CMS fall production Massimo Sgaravatto INFN Padova.
Military Technical Academy Bucharest, 2006 SECURITY FOR GRID INFRASTRUCTURES - Grid Trust Model - ADINA RIPOSAN Department of Applied Informatics.
Condor Project Computer Sciences Department University of Wisconsin-Madison Security in Condor.
Jim Basney Computer Sciences Department University of Wisconsin-Madison Managing Network Resources in.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Zach Miller Computer Sciences Department University of Wisconsin-Madison What’s New in Condor.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
Hao Wang Computer Sciences Department University of Wisconsin-Madison Security in Condor.
Grid Resource Allocation and Management (GRAM) Execution management Execution management –Deployment, scheduling and monitoring Community Scheduler Framework.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
Military Technical Academy Bucharest, 2004 GETTING ACCESS TO THE GRID Authentication, Authorization and Delegation ADINA RIPOSAN Applied Information Technology.
Hao Wang Computer Sciences Department University of Wisconsin-Madison Authentication and Authorization.
John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.
Privilege separation in Condor Bruce Beckles University of Cambridge Computing Service.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Zach Miller Computer Sciences Department University of Wisconsin-Madison Securing Condor.
Condor Project Computer Sciences Department University of Wisconsin-Madison Grids and Condor Barcelona,
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Derek Wright Computer Sciences Department University of Wisconsin-Madison Condor and MPI Paradyn/Condor.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
INSA LYON1 Security Policy Configuration Issues in Grid Computing Environments George Angelis, Stefanos Gritzalis, and Costas Lambrinoudakis Presentation.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Ian D. Alderman Computer Sciences Department University of Wisconsin-Madison Condor Week 2008 End-to-end.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Trusted Operating Systems
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Todd Tannenbaum Computer Sciences Department University of Wisconsin-Madison Condor NT Condor ported.
Jaime Frey Computer Sciences Department University of Wisconsin-Madison Condor and Virtual Machines.
Chapter 15: Access Control Mechanisms Dr. Wayne Summers Department of Computer Science Columbus State University
HTCondor Security Basics HTCondor Week, Madison 2016 Zach Miller Center for High Throughput Computing Department of Computer Sciences.
Security Principles.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Condor Project Computer Sciences Department University of Wisconsin-Madison Condor-G: Condor and Grid Computing.
Greg Quinn Computer Sciences Department University of Wisconsin-Madison Privilege Separation in Condor.
Access Control Model SAM-5.
HTCondor Security Basics
Grid Security.
A user-friendly approach to grid security
THE STEPS TO MANAGE THE GRID
Viet Tran Institute of Informatics Slovakia
Privilege Separation in Condor
HTCondor Security Basics HTCondor Week, Madison 2016
Chapter 22: Malicious Logic
Chapter 29: Program Security
Delegation of Control Manage Active Directory Objects 3.7
Presentation transcript:

Ian D. Alderman Computer Sciences Department University of Wisconsin-Madison Condor Week 2007 Signed ClassAds and Restricted Delegation

Condor Week

Condor Week › Multiple administrative domains aren’t well protected from each other, yet are increasingly common: Condor-C, Condor-G, flocking… › As cooperation between administrative domains increases, so does utilization. Can we take advantage of this without also increasing risk? Security Issues in Multiple Administrative Domains Job input and output data Execute Machines Data unrelated to the job Protect:

Condor Week Shoulders of Giants Principle of least privilege: “Every program and every user of the system should operate using the least set of privileges necessary to complete the job.” - Saltzer and Schroeder, 1975

Condor Week Credential Scope › Jobs either carry no credentials or the full credentials of the submitting user. › Jobs with credentials can impersonate the submitting user without any restriction. › Intermediaries that handle credentials can lose or abuse them, or alter tasks, input, and results. Limit the scope of credentials to what the job needs and no more.

Condor Week Goals › Make security assumptions explicit. › Reduce the number and scope of assumptions that must be made about infrastructure w.r.t. security. › Provide end-to-end security options in addition to point-to-point security. › Provide end-to-end cryptographic audit. › Alter attacker incentives. › Reduce barriers to increased cooperation and utilization.

Condor Week

Condor Week Framework Overview › Signed ClassAds ∘ Digital signature applied to a ClassAd: altering invalidates the signature. › Task-specific Proxy Certificates ∘ GSI proxy certificate with signed ClassAd embedded: links certificate to a particular task. › Action Authorization Expressions ∘ Expressions within the signed ClassAd limit the usage of the proxy certificate chain.

Condor Week Participants U SXR U – submitting user S – scheduler X – execute host R – storage resource

Condor Week Actions U SXR U – submitting user S – scheduler X – execute host R – storage resource s - submit f - forward e - execute a - access sea

Condor Week Forwarding Action U S s - submit f - forward e - execute a - access SXR s ea U – submitting user S – scheduler X – execute host R – storage resource f

Condor Week Multiple Administrative Domains U S U – submitting user S – scheduler X – execute host R – storage resource SXR s - submit f - forward e - execute a - access s ea f R

Condor Week Authentication U S U – submitting user S – scheduler X – execute host R – storage resource SXR s - submit f - forward e - execute a - access s ea f GSI Proxy Certificates Mutual Authentication /O=Brown CS/CN=pavlo /O=Brown CS/CN=scheduler.cs.brown.edu/O=Penn CS/CN=scheduler.cs.penn.edu/O=UMD CS/CN=storage.cs.umd.edu/O=Penn CS/CN=ex0001.cs.penn.edu

Condor Week Authorization U S U – submitting user S – scheduler X – execute host R – storage resource SXR s - submit f - forward e - execute a - access s ea f /O=Brown CS/CN=pavlo -> Recipient checks ACL

Condor Week Problems › Authorization entirely in the hands of the recipients: no restrictions can be expressed by the submitter. › Credential too permissive: can be used to access anything on resources, run any job on execute machine. › Unnecessary reliance on schedulers to preserve confidentiality and integrity of credentials. › No audit trail.

Condor Week Attackers › Incentive to attack schedulers; compromise results in full control: ∘ Alter tasks (to attack execute hosts or cause them to attack external hosts). ∘ Access resources using credentials. ∘ Forge results returned to submitter.

Condor Week Framework Overview › Signed ClassAds ∘ Digital signature applied to a ClassAd: altering invalidates the signature. › Task-specific Proxy Certificates ∘ GSI proxy certificate with signed ClassAd embedded: links certificate to a particular task. › Action Authorization Expressions ∘ Expressions within the signed ClassAd limit the usage of the proxy certificate chain.

Condor Week Signed ClassAds › ClassAds with digital signatures. › Signature made and checked using X.509 keys and certificates. › Altered ClassAds are easily detected. › External files can be referenced using checksums. › Explicit association between a task and information about its origin and provenance. › Results can be signed as well: receipts.

Condor Week Task-specific Proxy Certificates › Proxy certificates with embedded signed ClassAds. › Policy field in proxy certificate contains signed ClassAd for the associated job. › Proxy delegation chain inalterably linked with particular job. TS

Condor Week Action Authorization Expressions ClassAd language expressions included in the signed ClassAd. Can specify conditions on actions that the proxy certificate might be used for: submit, forwarding, execute, and access. Permits the submitting user to limit how their credentials are used.

Condor Week U= /O=Brown CS/CN=pavlo Sa= /O=Brown CS/CN=sche… Sb= /O=Penn CS/CN=sche… f(U, Sa, Sb) Mutual Authorization U S U – submitting user S – scheduler X – execute host R – storage resource SXR s - submit f - forward e - execute a - access s ea f U= /O=Brown CS/CN=pavlo S= /O=Brown CS/CN=sche… s(U,S) /O=Brown CS/CN=pavlo /O=Brown CS/CN=scheduler.cs.brown.edu/O=Penn CS/CN=scheduler.cs.penn.edu/O=UMD CS/CN=storage.cs.umd.edu/O=Penn CS/CN=ex0001.cs.penn.edu U= /O=Brown CS/CN=pavlo S= /O=Penn CS/CN=sche… X= /O=Penn CS/CN=ex0001… e(U, S, X) U= /O=Brown CS/CN=pavlo X= /O=Penn CS/CN=ex0001… R= /O=UMD CS/CN=storage… a(U, X R)

Questions? For more information, contact: Ian Alderman