Ken Klingenstein Director, Internet2 Middleware and Security Middleware and Security Update.

Slides:



Advertisements
Similar presentations
Dr Ken Klingenstein Director, Internet2 Middleware and Security Emerging Infrastructure for Collaboration: Next Generation Plumbing.
Advertisements

The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Dr Ken Klingenstein Shibboleth and InCommon: An Update and Next Steps.
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CF21) IRNC Kick-Off Workshop July 13,
Internet2 and other US WMD Update. Topics Update on non-merger, Newnet (and the control plane), InCommon and other feds “Product” update – Shib, Grouper,
Drive-By Dialogues. Presenter’s Name Topics The Long Strange Trip of I2 – NLR Merger A Brief Comment on Optical Networking Middleware Developments Security.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Peter Deutsch Director, I&IT Systems July 12, 2005
Presenter’s Name InCommon Approximately 80 members and growing steadily More than two million “users” Most of the major research institutions (MIT joining.
LionShare Presented by Eric Ferrin, Sr Director, Digital Library Technologies Feb 3, 2004 Copyright Penn State University, This work is.
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
1 Update on the InCommon Federation, Higher Education’s Community of Trust EDUCAUSE 2005 October 19 10:30am-11:20am.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
1998 Fall Internet2 Project Meeting San Francisco September.
Authority, Virtual Organizations and Diagnostics: Building and Managing Complexity Ken Klingenstein Director, Internet2 Middleware and Security.
Federated Administration: The Cutting Edge. Topics  Federations: The Basics Business drivers and the basic model Technical Considerations and the marketplace.
Dr Ken Klingenstein Shibboleth and InCommon: An Update and Next Steps.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
1 The InCommon Federation John Krienke Internet2 Spring Member Meeting Tuesday, April 25, 2006.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Shibboleth & Federations Renee’ Shuey May 4, 2004 ITS – Emerging Technologies The Pennsylvania State Universtiy.
InCommon Update Internet2 Meeting April 20, 2004 Ken Klingenstein and Carrie Regenstein.
The New Problem Space: Issues for the Future Ken Klingenstein Director, Internet2 Middleware and Security.
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
Russ Hobby Program Manager Internet2 Cyberinfrastructure Architect UC Davis.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study Renee’ Shuey May 4, 2004 ITS – Emerging Technologies.
Federations: InQueue to InCommon Renee Woodten Frost 19 April 2004.
Shibboleth at Columbia Update David Millman R&D July ’05
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Project Shibboleth Update, Demonstration and Discussion Michael Gettes May 20, 2003 TERENA Conference, Zagreb, Croatia Michael Gettes.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
February 1, 2002 Internet2 Middleware Initiative and MACE RL "Bob" Morgan, University of Washington.
3 December 2015 Examples of partnerships and collaborations from the Internet2 experience Interworking2004 Ottawa, Canada Heather Boyles, Internet2
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
Enterprise and Federated Security: Some Frontiers.
Security at Line Speed: Integrating Academic Research and Enterprise Security.
April 14, 2005MIT Libraries Visiting Committee Libraries Strategic Plan Theme III Work to shape the future MacKenzie Smith Associate Director for Technology.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
Internet2 and Cyberinfrastructure Russ Hobby Program Manager,
6 February 2004 Internet2 Priorities 2004 Internet2 Industry Strategy Council Douglas Van Houweling.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
Advanced research and education networking in the United States: the Internet2 experience Heather Boyles Director, Member and Partner Relations Internet2.
October 2, 2001 Middleware: Pieces and Processes RL "Bob" Morgan, University of Washington.
Security Architectures and Advanced Networks Ken Klingenstein Day Job: Middleware Night Job: Network Security.
Growth. Interfederation PKI is globally scalable Unfortunately, its not locally deployable… Federation is locally deployable Can it.
InCommon Update FedEd Meeting June 16, 2004 Carrie Regenstein.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
Federated Security Services Ken Klingenstein Day Job: Middleware Night Job: Network Security.
South Big Data Innovation Hub
JRA3 Introduction Åke Edlund EGEE Security Head
Mark Poepping, SALSA Chair
Overview and Development Plans
Open Source Web Initial Sign-On Packages
Signet & Privilege Management
Shibboleth and Federations
Presentation transcript:

Ken Klingenstein Director, Internet2 Middleware and Security Middleware and Security Update

Since we last talked…  Middleware Unified field theory of trust Shibboleth and InCommon Signet – an authority system Diagnostics Corporate dimensions –Tech transfer –Trust relationships –Government interactions  Security Strategic emphasis for Internet2, within the context of STF Formation of Salsa and its working groups Federated Security Services Corporate dimensions –R&D in federated services –Is there a business model?

Unified field theory of Trust  Bridged, global hierarchies of identification-oriented, often government based trust – laws, identity tokens, etc. Passports, drivers licenses Future is typically PKI oriented  Federated enterprise-based; leverages one’s security domain; often role-based Enterprise does authentication and attributes Federations of enterprises exchange assertions (identity and attributes  Peer to peer trust; ad hoc, small locus personal trust A large part of our non-networked lives New technology approaches to bring this into the electronic world. Distinguishing P2P apps arch from P2P trust  Virtual organizations cross-stitch across one of the above

Shibboleth Status  Open source, privacy preserving federating software, developed by an I2 wg and implemented by I2 universities  Being very widely deployed in US and international universities  Work underway on intuitive graphical interfaces for the powerful underlying Attribute Authority and resource protection  Likely to coexist well with Liberty Alliance and may work within the WS framework from Microsoft.  Growing use and development interest in several countries, providing collaboration tools  V1.0 released april 03; v1.2 release next week; v2.0 likely top of the line… 

Federations  Associations of enterprises that come together to exchange information about their users and resources in order to enable collaborations and transactions  Enroll and authenticate and attribute locally, act federally.  Uses federating software (e.g. Liberty Alliance, Shibboleth, WS-*) common attributes (e.g. eduPerson), and a security and privacy set of understandings  Enterprises (and users) retain control over what attributes are released to a resource; the resources retain control (though they may delegate) over the authorization decision.  Several federations now in construction or deployment

InCommon federation  Federation operations – Internet2  Federating software – Shibboleth 1.1 and above  Federation data schema - eduPerson or later and eduOrg or later  Becomes operational April 5, with several early entrants to help shape the policy issues.  Precursor federation, InQueue, has been in operation for about six months and will feed into InCommon 

InQueue Origins  Rutgers University  University of Wisconsin  New York University  Georgia State University  University of Washington  University of California Shibboleth Pilot  University at Buffalo  Dartmouth College  Michigan State University  Georgetown  Duke  The Ohio State University  UCLA  Internet2  Carnegie Mellon University  National Research Council of Canada  Columbia University  University of Virginia  University of California, San Diego  Brown University  University of Minnesota  Penn State University  Cal Poly Pomona  London School of Economics  University of North Carolina at Chapel Hill  University of Colorado at Boulder  UT Arlington  UTHSC-Houston  University of Michigan  University of Rochester  University of Southern California

InCommon Management  Operational services by I2 Member services Backroom (CA, WAYF service, etc.)  Governance Executive Committee - Carrie Regenstein - chair (Wisconsin), Jerry Campbell, (USC), Lev Gonick (CWRU), Clair Goldsmith (Texas System), Mark Luker (EDUCAUSE),Tracy Mitrano (Cornell), Susan Perry (Mellon), Mike Teetz, (OCLC), David Yakimischak (JSTOR). Project manager – Renee Frost (Internet2)  Membership open to.edu and affiliated business partners (Elsevier, OCLC, Napster, Diebold, etc…)  Contractual and policy issues being defined now…  Likely to take 501(c)3 status

The potential for InCommon  The federation as a networked trust facilitator  Needs to scale in two fundamental ways Policy underpinnings need to move to normative levels among the members; “post and read” is a starting place… Inter-federation issues need to be engineered; we are trying to align structurally with emerging federal recommendations  Needs to link with PKI and with federal and international activities  If it does scale and grow, it could become a most significant component of cyberinfrastructure…

Beyond web services…  Federated security services Collaborative incident correlation and analysis Trust-mediated transparency and other security-aware capabilities  Federated extensions to other architectures Lionshare project for P2P file sharing IM Federated Grids

P2P arch over federated trust - Lionshare  P2P file sharing application that is: Enterprise-based – uses authentication and campus directory and resource discovery Federated – works between institutions, using local authentication and authorization Learning object oriented – meta-data based; linked to digital repositories, courseware, etc.  Developed at Penn State University, now being extended with assistance from Mellon Foundation, Internet2, OKI, Edusource  URL is

Virtual organizations  Need a model to support a wide variety of use cases Native v.o. infrastructure capabilities, differences in enterprise readiness, etc. Variations in collaboration modalities Requirements of v.o.’s for authz, range of disciplines, etc  JISC in the UK has lead; solicitation is on the streets (see ( builds on NSF NMIhttp://  Tool set likely to include seamless listproc, web sharing, shared calendaring, real-time video, privilege management system, etc.

Signet - an authority system  As the number and complexity of applications grow, so does the burden of administering permissions within them  A key juncture of end-user, system owner and auditor interests; a big win if done with business process reengineering  Applicable to enterprise applications as diverse as SIS, Financials, Calendaring, Course Management, Electronic Key Access, etc.  Potentially of value to virtual organizations as diverse as Grids and museum curator associations.  Based on pioneering work now in production at Stanford, being generalized and upgraded with NSF NMI grant funds; pilots later this spring

Stanford Authz Model

Signet Deliverables The deliverables consist of  A recipe, with accompanying case studies, of how to take a role-based organization and develop apprpriate groups, policies, attributes etc to operate an authority service  Templates and tools for registries and group management  a Web interface and program APIs to provide distributed management (to the departments, to external programs) of access rights and privileges, and  delivery of authority information through the infrastructure as directory data and authority events.

Home

Grant Authority Wizard

Diagnostics  The job no one wants to do, but is critical to successful and scalable enterprise and federated deployments of almost all technologies.  Hard to sell until too late, after the pain has set in…  There is a need for an integrated approach to performance, security and middleware diagnostics.  Internet2 is working hard right now to figure out how: To integrate efforts To get traction in areas that are too busy inventing to work on diagnostics

Steps to Enable Diagnostic Applications  Establish the common event record  Enable the collection of events from a wide array of event sources Network: NetFlow, SNMP, RMON, etc Security: IDS, Snort, firewalls, etc Applications: Shib, Dir, IM, P2P, smtpd, named, httpd, Kerberos, etc Hosts: /var/log/*, Syslog, etc

Steps to Enable Diagnostic Applications (2)  Build tools to create dissemination infrastructures that, Allows access to the diagnostic data Provides operators to filter, anonymize, aggregate, tag, store and archive the data Enables pipelining of data operators to organize and manipulate diagnostic data based on an organization or federations policies Provide a common API so applications can access the diagnostic data

Enabling Diagnostic Applications With a Common Event Descriptor Security Related Events Middleware Related Events Network Related Events Collection and Normalization of Events Dissemination Network Diagnostic applications (Middleware, Network, Security) can extract event data form multiple data sets

Diagnostic Data Pipelining Data flows can be constructed to provide the desired function and policy within a enterprise or federation Filter C-4 Network Events ArchiveDBAnonimizationTaggingAggregationNormalization C-3 C-1 P-1 C-2 P-2 P-3 P-4 P-5 C-* Collection Module Host P-* Processing Module Host Host or Security Events

Event Record Event Descriptor Meta Field Event Descriptor Version Number Observation Description Pointer ID – unique event identifier Time - start/stop IP Address(es) – source/(destination) Source Class – application, network, system, compound, bulk, management Event Name Tag – Native language ID, user defined Status – normal, informational, warning, measurement, critical, error, etc. Major Source Name – filename, Netflow, Syslogd, SNMP, shell program, etc. Minor Source Name – logging process name (named), SNMP variable name, etc. Raw Data Encoding Mechanism – Binary, ASN1, ASCII, XML, etc. Raw Event Data Description Pointer Raw Event Data

Event Record Event Descriptor Meta Field Event Descriptor Observation Description Pointer Address type of observer (IPV4, IPV6, MAC, etc.) Address of observer Address type of collection agent (IPV4, IPV6, MAC, etc.) Address of collection agent Source Type (file, stream, polled, interrupt) Collection agent name (Netflow.1.0, named.2.3, etc.) Raw Event Data

Event Record Event Descriptor Meta Field Event Descriptor Raw Event Data Description Pointer Schema of raw event data Parsing expression pointer Raw Event Data

Event Record Event Descriptor Meta Field Event Descriptor Event Name Tag – (null), user defined (can be multiple tags) Examples: “astronomy-app” “ShibUserHandle=foo” “DormTraffic” “Worm-W32B” “AMP” “MS-UPDATE-34333” “IE-Patch-2343” Raw Event Data

Event Record Overhead Event Descriptor Meta-Field Event DescriptorRaw Event Data Version Number – 1 byte Observation Description Pointer – 4 bytes ID – 10 bytes Time – 24 or 12 bytes IP Address(es) – (8 or 16 bytes) * 2 for IPV6 Source Class – 1 byte Event Name Tag – 0 to 16 bytes typical (can be as large as 256) Status – 1 byte Major Source Name – 0 to 32 bytes typical (can be as large as 256) Minor Source Name – 0 to 16 bytes typical (can be as large as 256) Raw Data Encoding Language - 1 byte Raw Event Data Description Pointer – 4 Bytes

Security Policy Discovery Probing the Destination Firewall Pros Actively tests a configuration of a device or path Cons Cannot discover past the first device that is blocking Destination being probed may think it is under attack Probe

Security Policy Discovery Publishing Policy Pros Fast and simple method for discovering policy Can look beyond the first blocking device Cons Policy may not be up-to-date Publishing policy may be looked at as an exposure Policy Publisher

Security Policy Discovery Using Diagnostic Event Records Org 2 Records Pros Provides a audit trail of actions Enables repudiation by letting two organizations, share data through a common event record can anonomize sensitive data Cons Organizations must be willing to share data Passive auditing enough, active methods can augment Org 1 Records

Example – Shib failure  Get a Shib failure message due to Network performance problem Firewall settings Host down Misconfigured Shib installation  “Shire failure”  Where are diagnostics done and remedies applied?

MW Corporate Dimensions  Tech transfer  Trust business relationships  Government interactions

Security  Designated as a strategic direction for Internet2 last fall  Intended to complement and augment other activities within the EDUCAUSE/Internet2 Security Task Force  Build on the success of the NSF-sponsored Security at Line Speed workshop  A thread as much as a workgroup; staffing is reallocated I2 personnel, corporate fellows, and a clone  Created Salsa as member-driven steering group 

Salsa Membership Mark Poepping - Carnegie Mellon University (chair) Chris Cramer - Duke University Gary Dobbins - University of Notre Dame Terry Gray - University of Washington Chris Misra - University of Massachusetts Doug Pearson - Indiana University Jim Pepin - University of Southern California James Sankar (European liaison) - UKERNA Jeff Schiller - Massachusetts Institute of Technology Joe St. Sauver - University of Oregon Steve Wallace - Indiana University

Salsa Work Groups  Security Architecture – Marty Schulman (Juniper), Chair Establish a common reference model and nomenclature Frame the tradeoffs As part of the early activities, create a body of discussion and practice around “DNS-based, application oriented new networking ideas”  Network Authn/z – Chris Misra (UMass), Chair First task is to create a set of effective practices around “campus network registration” Seond task likely to begin work responsive to the “visiting scientist problem” and the Terena JRA5 activities

Federated Security Services and Capabilities  A potentially significant addition to our security portfolio, but like everything else already there, not a magic bullet.  Couples shared backbones (Abilene, NLR, Terragrid, etc.) with a common trust fabric (InCommon); leverages Abilene Observatory and REN-ISAC  Two goals Collaborative security tools and analyses Security aware capabilities that permit science and innovation to continue despite security barriers  Developed as a response to an NSF CyberTrust solicitation, but ready to be marketed elsewhere (DHS, industry)

Corporate dimension  R&D possibilities  Is there a business model (internal or external) for federated security services?

Ken Klingenstein Director, Internet2 Middleware and Security Internet2 Webinars

 New seminar program  Designed for corporate member audience  “Low-tech” – phone, web browser  Security and Middleware topics  Pilot series of 3 monthly webinars  Launch May 19, 2004

Internet2 Webinars  “Securing Advanced Corporate Networks”  May 19, 2004 at 2:00 p.m. EDT  Eric Metalla, McAfee Research New security technologies for advanced networks  TBA, Ford Motor Company Network architectures for advanced security  Ken Klingenstein, Internet2 Internet2-led security activities

Internet2 Webinars  “Deploying and Supporting Federations”-- June  “Privilege Management”-- July

Internet2 Webinars