GRID workshop Enabling Grids for E-sciencE www.eu-egee.org iag.iucc.ac.il PKI, Certificates and CAs – Oh My! Hank Nussbacher Israel InterUniversity Computation.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Liang ZHAO, PKU EUChinaGrid 3 rd Tutorial Nov.25, 2006 Authentication and Authorization in gLite Liang ZHAO Peking University.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Lecture 23 Internet Authentication Applications
Presentation Two: Grid Security Part Two: Grid Security A: Grid Security Infrastructure (GSI) B: PKI and X.509 certificates C: Proxy certificates D:
Grid Security. Typical Grid Scenario Users Resources.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security on Grid Roberto Barbera Univ. of Catania and INFN
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Security NeSC Training Team International Summer School for Grid Computing, Vico Equense,
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
INFSO-RI Enabling Grids for E-sciencE Security, Authorisation and Authentication Mike Mineter Training, Outreach and Education National.
Grid Security Overview The Globus Project™ Copyright (c) 2002 University of Chicago and The University of Southern California. All.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Authentication Policy David Kelsey CCLRC/RAL 15 April 2004, Dublin
\ Grid Security and Authentication1. David Groep Physics Data Processing group Nikhef.
Security Management.
Enabling Grids for E-sciencE Security on gLite middleware Matthieu Reichstadt CNRS/IN2P3 ACGRID School, Hanoi (Vietnam) November 5th, 2007.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Basics for the User Guy Warner NeSC Training Team An Induction to EGEE for GOSC.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
13-May-03D.P.Kelsey, WP8 CA and VO organistion1 CA’s and Experiment (VO) Organisation WP8 Meeting EDG Barcelona, 13 May 2003 David Kelsey CCLRC/RAL, UK.
INFSO-RI Enabling Grids for E-sciencE Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Security APIs in LCG-2 Andrea Sciabà LCG Experiment Integration and Support CERN IT.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
DataGrid WP6 CA meeting, CERN, 12 December 2002 IISAS Certification Authority Jan Astalos Department of Parallel and Distributed Computing Institute of.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
INFSO-RI Enabling Grids for E-sciencE Sofia, 22 March 2007 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Security, Authorisation and Authentication.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Enabling Grids for E-sciencE Authentication & Authorization Assaf Gottlieb Material from: Andrea Sciabà Åke Edlund, JRA3 Manager, KTH David.
Security Mechanisms The European DataGrid Project Team
INFSO-RI Enabling Grids for E-sciencE Security in gLite Gergely Sipos MTA SZTAKI With thanks for some slides to.
User Management: Authentication & Authorization on the NorduGrid Balázs Kónya, AndersWäänänen 3 rd NorduGrid Workshop, 23 May, 2002 Helsinki.
23-Oct-02D.P.Kelsey, Grid Security, HEPiX, FNAL1 LCG/EDG Security - update and plans HEPiX/HEPNT - FNAL 23 Oct 2002 David Kelsey CLRC/RAL, UK
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
EGEE is a project funded by the European Union under contract IST Grid computing Assaf Gottlieb Tel-Aviv University assafgot tau.ac.il
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Security, Authorisation and Authentication Mike Mineter, Guy Warner Training, Outreach and Education National e-Science Centre
INFSO-RI Enabling Grids for E-sciencE Authorisation and Authentication in gLite Mike Mineter National e-Science Centre, Edinburgh.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
7-May-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Issues and Planning or Report from the Security Group CERN, 8 May 2003 David Kelsey CCLRC/RAL, UK.
Security in WLCG/EGEE. Security – January Requirements Providers of resources (computers, storages, databases, services..) need risks to.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
Tutorial on "GRID Computing“ EMBnet Conference 2008 CNR - ITB Authenticated Grid access with robot certificates Giuseppe LA ROCCA INFN.
Trusted Organizations In the grid world one single CA usually covers a predefined geographic region or administrative domain: – Organization – Country.
Security, Authentication and Authorization Virginia Martín-Rubio Pascual RedIRIS/Red.es Curso Grid y e-Ciencia 2010, Valencia.
GRID-FR French CA Alice de Bignicourt.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Mike Mineter, National e-Science Centre.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Emidio Giorgio INFN Catania.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Setting up and Managing National CA for GRID Computing Ghassan SABA, HIAST H I A S T Regional Seminar on Identity Management and E-signatures Damascus,
Security, Authorisation and Authentication Mike Mineter,
Authentication, Authorisation and Security
Security, Authorisation and Authentication
Grid Security Jinny Chien Academia Sinica Grid Computing.
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Presentation transcript:

GRID workshop Enabling Grids for E-sciencE iag.iucc.ac.il PKI, Certificates and CAs – Oh My! Hank Nussbacher Israel InterUniversity Computation Center Ra’nanna, 28 September 2005

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X What is PKI? Public Key Infrastructure: Basis for authentication, integrity, confidentiality, non-repudiation Asymmetric encryption Digital signatures –A hash derived from the message and encrypted with the signer’s private key –Signature checked decrypting with the signer’s public key Allows key exchange in an insecure medium using a trust mode –Keys trusted only if signed by a trusted third party (Certification Authority) –A CA certifies that a key belongs to a given principal Certificate: held in two parts –Public key + principal information + CA signature –Private key: only the owner (should) use this Encrypted text Private Key Public Key Clear text message

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Digital Certificates A’s digital signature is safe if: 1. A’s private key is not compromised 2. B knows A’s public key How can B be sure that A’s public key is really A’s public key and not someone else’s? –A third party guarantees the correspondence between public key and owner’s identity, by signing a document which contains the owner’s identity and his public key (Digital Certificate) –Both A and B must trust this third party Two models: –X.509: hierarchical organization; –PGP: “web of trust”.

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X AA and Certificates X 509 Digital certificate is the basis of AA in EGEE Certification Authorities (CAs) –~one per country; builds network of “Registration Authorities” who issue certificates CAs are mutually recognized – to enable international collaboration – International Grid Trust Federation For Europe region CAs: – – CA certificates – issued to –Users: you get a Certificate and use it to access grid services –Sites providing resources Uses Public Key Infrastructure –Private key – known only to you –Public key included in your certificate

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X CAs in Europe

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Certificate Request Private Key encrypted on local disk Cert Request Public Key Cert User generates public/private key pair. User send public key to CA and then appears before CA with TZ/passport. CA confirms identity, signs certificate and sends back to user.

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Digital certificates The goal of authorization and authentication of users and resources is done through digital certificates, in X.509 format Certification Authority Certification Authority (CA) Digital CertificatesIssue Digital Certificates for users and machines Check the identity and the personal data of the requestor –Registration Authorities (RAs) do the actual validation CA’s periodically publish a list of compromised certificates –Certificate Revocation Lists (CRL): contain all the revoked certificates yet to expire CA certificates are self-signed For each player, a CA guarantees its authenticity with a certificate

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X X.509 Certificates An X.509 Certificate contains: –o–owner’s public key; –i–identity of the owner; –i–info on the CA; –t–time of validity; –S–Serial number; –d–digital signature of the CA Public key Subject:C=CH, O=CERN, OU=GRID, CN=Andrea Sciaba 8968 Issuer: C=CH, O=CERN, OU=GRID, CN=CERN CA Expiration date: Aug 26 08:08: GMT Serial number: 625 (0x271) CA Digital signature Structure of a X.509 certificate

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Certificate Validity The public key from the CA certificate can then be used to verify the certificate. Name Issuer: CA Public Key Signature =? Name: CA Issuer: CA CA’s Public Key CA’s Signature slide based on presentation given by Carl Kesselman at GGF Summer School 2004 Decrypt CA

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X GRID Security: the players Large and dynamic population Different accounts at different sites Personal and confidential data Heterogeneous privileges (roles) Desire Single Sign-On Users “Group” data Access Patterns Membership “Groups” Sites Heterogeneous Resources Access Patterns Local policies Membership Grid

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Requirements for AuthN and AuthZ Support multiple VOs across –Administrative domains –National borders –Via Internet Single sign-on –Multiple services –Delegation Scalability: –N,000 users –M,000 CPUs –Without M*N million usernames / passwords… Security INTERNET

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Who are the CAs? 46 CA’s so far –Armenia, Austria, Belgium, Canada, CERN, France (4), China, Cyprus (2), Czech Republic (2), Estonia, Germany (4), Greece, Hungary, Ireland, Israel, Italy, Netherlands, Nordics, Pakistan, Poland, Portugal (2), Russia (2), South East Europe (Balkans), Slovakia, Slovenia, Spain, Switzerland (4), Taiwan, UK, US(3) All required to have a CP/CPS –Certificate Policy/Certificate Practice Statement

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X IUCC CP/CPS Israel’s is located at: –78 certificates issued so far –22 computer –56 human

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X IUCC CP/CPS Highlights Authentication –TZ or Passport –Visual identification (only in person) via CA (no RAs yet) Key sizes (minimum) –User and host: 1024 bit –IUCC CA: 2048 bit Validity –IUCC CA: 5 years –Entity: maximum 1 year

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X LIST of Israeli CA and RAs Eddie Aronovich, Certificate Authority Manager University Name phone Hebrew Ayelet Hashachar Drori Haifa Herakel Endrawes Technion Anne Weizmann Pierre Choukroun BGU Amir Open-U Reuven TAU Avi

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X IUCC CA

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X IUCC Request

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X IUCC Request – part 2

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Cyprus CA

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Cyprus RA

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X CA CP/CPS Every CA must provide a CP/CPS (combined) –RFC2527 preferred Cross-evaluation of CP/CPS by every CA Manager –tries to make up for lack of auditing –provide trust guidelines for “local” site administrators –Every CA Manager should inspect all other CP/CPSs

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X CA “Minimum Requirements” Security – machine with CA private key not connected to any network – All CA’s issue a CRL (Certification Revocation List) with a 30-day lifetime (updated ~ weekly) – Relying parties must update every 24 hrs – Audit logs must be kept

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Certificate Information To get cert information run grid-cert-info grid-cert-info -subject /C=CH/O=CERN/OU=GRID/CN=Simone Campana 7461 Options for printing cert information -all-startdate -subject-enddate -issuer-help

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X User Responsibilities Keep your private key secure. Do not loan your certificate to anyone. Report to your local/regional contact if your certificate has been compromised. Do not launch a delegation service for longer than your current task needs. If your certificate or delegated service is used by someone other than you, it cannot be proven that it was not you. IT IS YOUR PASSPORT AND CREDIT CARD

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Grid Security Infrastructure - proxies de facto standard for Grid middleware Based on PKI To support…. –Single sign-on: to a machine on which your certificate is held –Delegation: a service can act on behalf of a person –Mutual authentication: both sides must authenticate to the other ….GSI introduces proxy certificates –Short-lived certificates signed with the user’s certificate or a proxy –Reduces security risk, enables delegation CA and user included in the proxy.... See practical later

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Use Delegation to Establish Dynamic Distributed System Compute Center VO Service slide based on presentation given by Carl Kesselman at GGF Summer School 2004

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X User Authorisation to Access Resource slide based on presentation given by Carl Kesselman at GGF Summer School 2004

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Authentication, Authorisation in LCG Authentication –User certificate signed by CA –Connects to UI by ssh –Downloads certificate –Invokes Proxy server –Single logon – to UI - then Grid Security Infrastructure identifies user to other machines Authorisation –User joins Virtual Organisation –VO negotiates access to Grid nodes and resources –Authorisation tested by CE –gridmapfile maps user to local account UI CA VO mgr Personal/ once VO database Gridmapfiles on CE GSI VO service Daily update LCG

Enabling Grids for E-sciencE GRID Workshop Authorisation and Authentication via X Questions?