1 Grids and PKI Bridges (Globus Toolkit) EDUCAUSE/Dartmouth PKI Summit July 26, 2005 Shelley Henderson - USC Jim Jokl - Virginia.

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
MyProxy: A Multi-Purpose Grid Authentication Service
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
SAFE BioPharma Association CONFIDENTIAL1 SAFE Public Key Infrastructure (PKI) 2005 EDUCAUSE/Dartmouth PKI Deployment Summit.
1 HEPKI-TAG Update EDUCAUSE/Dartmouth PKI Summit July 26, 2005 Jim Jokl University of Virginia.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Lecture 23 Internet Authentication Applications
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Grid Security. Typical Grid Scenario Users Resources.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
December 8 & 9, 2005, Austin, TX SURA Cyberinfrastructure Workshop Series: Grid Technology: The Rough Guide Authentication, Authorization, & Identity Issues.
1 NMI Testbed Activities at Virginia SURA NMI Testbed Workshop October 1, 2004 Jim Jokl
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Some Common Campus PKI Applications January 2004 CSG Meeting Jim Jokl.
SIS: Secure Information Sharing for Windows Systems Osama Khaleel CS526 Semester Project.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Security Mechanisms The European DataGrid Project Team
HEBCA – Higher Education Bridge Certification Authority Presented by Scott Rea and Mark Franklin, Fed/Ed Meeting, 12/14/2005.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
1 11 th Fed/Ed PKI Meeting Some quick updates from recent HEPKI-TAG and SURA work Jim Jokl
Inside the PKI Framework: * Activating the Puzzle Pieces PKI Summit Snowmass August
Technical Issues that Challenge PKI Deployments Jim Jokl University of Virginia PKI Meeting August 12, 2004.
HEPKI-TAG Activities & Globus and Bridges Jim Jokl University of Virginia Fed/ED PKI Meeting June 16, 2004.
1 PKI Update September 2002 CSG Meeting Jim Jokl
GRID Centralized management of the Globus grid-mapfile Carlo Rocca INFN, Catania.
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
Unit 1: Protection and Security for Grid Computing Part 2
Configuring Directory Certificate Services Lesson 13.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
CAMP PKI UPDATE August 2002 Jim Jokl
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
GridShib: Grid/Shibboleth Interoperability September 14, 2006 Washington, DC Tom Barton, Tim Freeman, Kate Keahey, Raj Kettimuthu, Tom Scavo, Frank Siebenlist,
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
PKI Activities at Virginia September 2000 Jim Jokl
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Update on PKI Activities in the Spanish Academic Network PKI-COORD November 26, Amsterdam.
GRIDS Center Middleware Overview Sandra Redman Information Technology and Systems Center and Information Technology Research Center National Space Science.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Southeastern Universities Research Association (SURA) - Intro for Fed/Ed 18 Mary Fran Yafchak Senior Program Manager, IT
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Higher Ed Bridge CA Extending Trust Across Higher Education - And Beyond David L. Wasley University of California.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
MGRID Architecture Andy Adamson Center for Information Technology Integration University of Michigan, USA.
1 SURAGrid User/Host Certificate Authority SURAgrid Meeting MARCH 26, 2010 Jim Jokl University of Virginia.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Initiating Teragrid Sessions Raghu Reddy. Outline Motivation Initial Setup –Certificates –Proxies –Grid-map file entries and DNs Softenv for customizing.
Gridshib-intro-dec051 GridShib An Introduction Tom Scavo NCSA.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Fed/ED December 2007 Jim Jokl University of Virginia
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

1 Grids and PKI Bridges (Globus Toolkit) EDUCAUSE/Dartmouth PKI Summit July 26, 2005 Shelley Henderson - USC Jim Jokl - Virginia

2 Project Background  NSF NMI Program SURA’s NMI Testbed project The Testbed focused on tools developed by both the EDIT and Grids teams  Initial phase focused on testing/evaluation of individual components  One obvious area for EDIT/Grids campus integration is PKI Globus toolkit uses PKI internally Question: can existing campus PKIs be used with Globus?  Most testbed sites were installing Globus toolkit natively and using the simple CA that is packaged with the toolkit  Using campus CA infrastructure would enable researchers to leverage existing campus services instead of running their own CAs  Using central campus authentication, what is a good approach for inter-institutional grids? How to support the Testbed Grid  Developed in the final year of the Testbed’s funding CREN CA was no longer issuing institutional certificates Work on the USHER CA in its formative stages The EDUCAUSE HEBCA-BID was working to bring HEBCA into existence Question: can we make the Globus toolkit function in a bridged PKI environment?

3 Goal: Grids & PKI Bridges  Bridged PKI is a natural fit for Grids Many Grids consist of research groups from diverse organizations PKI bridge environments already working to link the various sector bridges to enable a larger trust fabric FBCA HEBCA SAFE Commercial Others

4 Background: Globus Toolkit & PKI  The Globus toolkit uses PKI for authentication of users and resources  A proxy certificate is used internally grid-proxy-init uses your personal certificate to sign a short-lived proxy certificate that the toolkit generates The proxy certificate is used for authentication within the grid Server certificates are signed by the site’s main CA  Unix Identity Mapping A file maps the certificate Subject to a Unix login name Authorization is either external or happens simply via the presence of a Unix account and Grid map file entry

5 NMI Testbed Globus Project Goals  Support the use of native campus CAs in Globus so that users can do all of their work using one set of credentials  Create some tools and documentation to make this easier with Globus  Scope intercampus Grid trust issues preparing to leverage other Higher Education PKI efforts Higher Education Bridge CA (HEBCA) US Higher Education Root CA (USHER)

6 Campus Integration Technical Issues  The Globus/Campus CA integration piece was relatively easy to deal with End user certificate profile  Standard campus certificate profiles (e.g. PKI-Lite) work well with Globus  Normal server certificate profiles work well with Globus Proxy certificate  Globus builds its own internal proxy certificates and these do not pose any special problems Campus CA integration is complicated by the Globus interface  Campus CAs and OS-exported certificates are generally in PKCS-12 format  Globus expects raw PEM files for the certificate and the private key

7 Campus and Inter-Campus Technical Issues  Some parts are harder The grid-mapfile file maps certificates to UNIX login names  Full certificate Subject DN maps to UNIX ID  Users with multiple certificates often need multiple entries  File must be maintained on each grid resource  How does this scale in a large Grid? Globus needs a signing_policy file for each certificate in a validation path  Tells what the certificate/key is allowed to do  Directory of files must be maintained on each grid resource – how does this scale in a large Grid?

8 Campus and Inter-Campus Technical Issues  And some other parts are harder still Globus PKI is based on OpenSSL OpenSSL is a good PKI toolkit but it is know that its path validation logic is not bridge aware  Does not compute all possible validation paths and choose the best one  Does not include any mechanism to discover needed certificates in a directory (e.g., based on the AIA field) Our goal  Make it work anyway by preloading all of the certificates needed on each grid resource  Use this proof of concept to hopefully convince the Globus developers to switch to bridge aware path validation libraries

9 PKI Bridge Path Validation

10 Initial Test: Globus and Bridges  Results from initial testing using Windows XP Bridge test environment Loaded all needed cross certificates into the /etc/grid-security/certificates directory  Recall that no directory-based certificate discovery is available Also loaded certificates for all intermediate CAs in a the hierarchies Generated some simple scripts to build and install signing_policy files  Globus did appear to work via bridge-based cross-certificates

11 Original Schematic of Grid Testbed PKI Integration Goal Campus E Grid A’s PKI Testbed Bridge CA Testbed CA Campus B Grid Campus C Grid Campus D Grid Campus A Grid Campus F Grid B’s PKI C’s PKI Cross-cert pairs User Certs

12 Inter-campus Testbed Globus Project Activity  Built Testbed Bridge CA Off-line system Stored securely when not is use  Cross-certifications UVA UAB TACC LSU USC

13 Testbed Grid Bridge Built a “production” test bridge for testbed Grid  Dedicated laptop running Linux  Laptop has never been on-line  Is only turned on during a cross-certification  Uses OpenSSL & simple scripts for the bridge CA “software”  Assumed that there were no Certification Policy issues  No Policy examination or mapping process  Everyone in the testbed had the same goals  Technical process only  Updated various scripts (e.g. CA, policy files, etc) Initial results  Bridge path validation in Globus works for user certificates  Server certificate validation not working via the bridge  User’s globusrun can’t validate the Globus gatekeeper’s certificate  Cross-certificates are fine  Windows XP could validate in both directions without problems

14 Results from Initial Testing with Testbed Grid Bridge  Initial test environment did not test server certs from different CAs No reason to believe that the behavior would be asymmetric  OpenSSL uses some simple heuristics (e.g. backs off one level to ignore root certificates passed as part of a SSL handshake)  Digging some more made it look like cross-certifying at the lowest level in a hierarchy would solve problem  Re-cross-certified UVa at the UVASKP level as a test New cross certificates & UVASKP root This works well with OpenSSL & Globus  We need to re-run this whole test again sometime to verify the behavior I: CREN S: CREN I: CREN S: UVAPKP I: UVAPKP S: UVASKP I: UVASKP S: USER

15 Conclusions at End of SURA NMI Testbed Project  Globus can be made to function via a PKI Bridge Preload cross-certificates Bridge aware path validation libraries within the Globus toolkit would be a big win  Some planned tools Credential converter web site that takes a PKCS-12 (as is available in most enterprise CAs) and returns the PEM files needed by Globus A tool to find and download cross-certificates  Based on Authority Information Access (AIA) fields in certificates like Windows XP (PKCS-7 objects) A tool to build Globus signing_policy files  Based on the certificates discovered via AIA

16 Work Continues with SURA Grid  Typical cross-certification issues from the SURAGrid bridge web siteweb site Authority Key Identifier (AKI)  DirName Path and Serial Number issue Basic Constraints  Site has CA=false in cross-certificate that sites sign  An incompatible Path Length is set Missing Subject name components  Some name fields used by the Bridge CA are commented out in the default OpenSSL configuration file  Site Identification Process Relies partially on us knowing the responsible parties Technically uses SSL server certificates from commercial CAs and thus relies on their process

17 SURAGrid: Original Plan  Sites provide dedicated systems Trust fabric via SURAGrid Bridge CA  Evolve to use HEBCA & USHER when ready LDAP server(s) hold  Cross-certificate pairs  Globus policy files  Unix UID information  Unix login names using a naming convention Shim Software  Builds grid_mapfile  Manages Unix accounts Site Administrators  Manage their own users enabling or disabling their access to SURAGrid Bridge CA LDAP Server Shim Site B Shim Site C Shim Site A Shim Site D Site Admins

18 SURAGrid: Current Architecture  Some sites will dedicate systems, others will utilize shared resources The Bridge CA, LDAP servers, and Site Admin infrastructure remain the same Sites that dedicate resources will continue to use the Shim Sites providing pieces of shared infrastructure will leverage the data in the LDAP servers as needed  Some tools will be provided Investigating usage aggregation/management software Bridge CA LDAP Server Shim Site B Site C Shim Site A Site D Site Admins

19 Current & Future Activity  Directory structure Hold cross-certificates in directory in PKCS-7 format? Would work with WinXP and AIA Hold cross-certificates as native certificate list on a per-site basis to simplify tools? Pre-built signing_policy files Designed to support Unix group and password maps  Complete the work on shim code  Anticipate that Java-based Globus Gatekeeper will use “bridge aware” path validation libraries  National infrastructure integration Work to transition to HEBCA at the appropriate time Work to leverage USHER when cross-certified with HEBCA SURAGrid could then focus on the directory service and applications over the longer run and not the trust fabric

20  General information on the SURAGrid work  Specific information on the Bridge CA portion of the work  Links to other sites, CA software, etc ul_2004/tues_bridges/tues_pm_4_spencer.pdf ul_2004/tues_bridges/tues_pm_4_spencer.pdf  Federal bridge and bridge-to-bridge context Questions - Discussion - References