Publication and Protection of Site Sensitive Information in Grids Shreyas Cholia NERSC Division, Lawrence Berkeley Lab Open Source Grid.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE The gLite middleware distribution OSG Consortium Meeting Seattle,
Advertisements

FP7-INFRA Enabling Grids for E-sciencE EGEE Induction Grid training for users, Institute of Physics Belgrade, Serbia Sep. 19, 2008.
Science Gateway Security Recommendations Jim Basney Von Welch This material is based upon work supported by the.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Services Abderrahman El Kharrim
A Model for Grid User Management Rich Baker Dantong Yu Tomasz Wlodek Brookhaven National Lab.
Grid Services at NERSC Shreyas Cholia Open Software and Programming Group, NERSC NERSC User Group Meeting September 17, 2007.
OSG Logging Architecture Update Center for Enabling Distributed Petascale Science Brian L. Tierney: LBNL.
Sergey Belov, Tatiana Goloskokova, Vladimir Korenkov, Nikolay Kutovskiy, Danila Oleynik, Artem Petrosyan, Roman Semenov, Alexander Uzhinskiy LIT JINR The.
SCD FIFE Workshop - GlideinWMS Overview GlideinWMS Overview FIFE Workshop (June 04, 2013) - Parag Mhashilkar Why GlideinWMS? GlideinWMS Architecture Summary.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Storage Security and Management: Security Framework
MyOSG: A user-centric information resource for OSG infrastructure data sources Arvind Gopu, Soichi Hayashi, Rob Quick Open Science Grid Operations Center.
Rsv-control Marco Mambelli – Site Coordination meeting October 1, 2009.
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
OSG Operations and Interoperations Rob Quick Open Science Grid Operations Center - Indiana University EGEE Operations Meeting Stockholm, Sweden - 14 June.
Introduction on R-GMA Shi Jingyan Computing Center IHEP.
OSG Middleware Roadmap Rob Gardner University of Chicago OSG / EGEE Operations Workshop CERN June 19-20, 2006.
Mark L. Green, Ph.D. Grid Computational Scientist Monitoring and Information Services Architecture and Deployment University at Buffalo The State University.
Summary of Accounting Discussion at the GDB in Bologna Dave Kant CCLRC, e-Science Centre.
A.Guarise – F.Rosso 1 Enabling Grids for E-sciencE INFSO-RI Comprehensive Accounting Views on large computing farms. Andrea Guarise & Felice Rosso.
G RID M IDDLEWARE AND S ECURITY Suchandra Thapa Computation Institute University of Chicago.
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
Overview of Monitoring and Information Systems in OSG MWGS08 - September 18, Chicago Marco Mambelli - University of Chicago
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
The huge amount of resources available in the Grids, and the necessity to have the most up-to-date experimental software deployed in all the sites within.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
And Tier 3 monitoring Tier 3 Ivan Kadochnikov LIT JINR
OSG Production Report OSG Area Coordinator’s Meeting Aug 12, 2010 Dan Fraser.
Ames Research CenterDivision 1 Information Power Grid (IPG) Overview Anthony Lisotta Computer Sciences Corporation NASA Ames May 2,
Job and Data Accounting on the Open Science Grid Ruth Pordes, Fermilab with thanks to Brian Bockelman, Philippe Canal, Chris Green, Rob Quick.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Performance Improvements to BDII - Grid Information.
OSG Tier 3 support Marco Mambelli - OSG Tier 3 Dan Fraser - OSG Tier 3 liaison Tanya Levshina - OSG.
July 25, 20071/21 OSG Information Services Gabriele Garzoglio, Rob Quick, Chris Green OSG Information Services, VO Monitoring Services and Resource Selection.
SAN DIEGO SUPERCOMPUTER CENTER Inca TeraGrid Status Kate Ericson November 2, 2006.
Ruth Pordes November 2004TeraGrid GIG Site Review1 TeraGrid and Open Science Grid Ruth Pordes, Fermilab representing the Open Science.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
GLIDEINWMS - PARAG MHASHILKAR Department Meeting, August 07, 2013.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
VO Privilege Activity. The VO Privilege Project develops and implements fine-grained authorization to grid- enabled resources and services Started Spring.
Site Validation Session Report Co-Chairs: Piotr Nyczyk, CERN IT/GD Leigh Grundhoefer, IU / OSG Notes from Judy Novak WLCG-OSG-EGEE Workshop CERN, June.
The OSG and Grid Operations Center Rob Quick Open Science Grid Operations Center - Indiana University ATLAS Tier 2-Tier 3 Meeting Bloomington, Indiana.
Mar 27, gLExec Accounting Solutions in OSG Gabriele Garzoglio gLExec Accounting Solutions in OSG Mar 27, 2008 Middleware Security Group Meeting Igor.
Auditing Project Architecture VERY HIGH LEVEL Tanya Levshina.
Eileen Berman. Condor in the Fermilab Grid FacilitiesApril 30, 2008  Fermi National Accelerator Laboratory is a high energy physics laboratory outside.
OSG Storage VDT Support and Troubleshooting Concerns Tanya Levshina.
April 25, 2006Parag Mhashilkar, Fermilab1 Resource Selection in OSG & SAM-On-The-Fly Parag Mhashilkar Fermi National Accelerator Laboratory Condor Week.
Accounting in LCG Dave Kant CCLRC, e-Science Centre.
Open Science Grid OSG Resource and Service Validation and WLCG SAM Interoperability Rob Quick With Content from Arvind Gopu, James Casey, Ian Neilson,
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
The Resource Selection Service (ReSS) Activity Gabriele Garzoglio Fermilab, Computing Division March 14, 2006.
INFSO-RI Enabling Grids for E-sciencE DGAS, current status & plans Andrea Guarise EGEE JRA1 All Hands Meeting Plzen July 11th, 2006.
OSG Status and Rob Gardner University of Chicago US ATLAS Tier2 Meeting Harvard University, August 17-18, 2006.
Monitoring and Information Services Core Infrastructure (MIS-CI) Service Description Mark L. Green OSG Integration Workshop at UC Feb 15-17, 2005.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
Parag Mhashilkar Computing Division, Fermilab.  Status  Effort Spent  Operations & Support  Phase II: Reasons for Closing the Project  Phase II:
Enabling Grids for E-sciencE INFN Workshop – May 7-11 Rimini 1 Grid Accounting Status at INFN Riccardo Brunetti INFN-TORINO.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Services for Distributed e-Infrastructure Access Tiziana Ferrari on behalf.
Open Science Grid Configuring RSV OSG Resource & Service Validation Thomas Wang Grid Operations Center (OSG-GOC) Indiana University.
Antonio Fuentes RedIRIS Barcelona, 15 Abril 2008 The GENIUS Grid portal.
Grid Colombia Workshop with OSG Week 2 Startup Rob Gardner University of Chicago October 26, 2009.
OSG User Group August 14, Progress since last meeting OSG Users meeting at BNL (Jun 16-17) –Core Discussions on: Workload Management; Security.
Cloud Security– an overview Keke Chen
Monitoring and Information Services Technical Group Report
ALICE Monitoring
POW MND section.
Accounting at the T1/T2 Sites of the Italian Grid
Leigh Grundhoefer Indiana University
Monitoring and Information Services
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Publication and Protection of Site Sensitive Information in Grids Shreyas Cholia NERSC Division, Lawrence Berkeley Lab Open Source Grid and Cluster Conference May 15th, 2008

Information Collection in Grids To create a successful and functional grid you need to collect information from sites Grid infrastucture must publish collected information and make it available to interested parties We want to analyze the vectors of information collection –Systems publishing/collecting information –Type of information being gathered –Methods of data protection applied to this information

Focus on Open Science Grid What is the Open Science Grid? –Virtual Facility providing distributed compute and storage resources –Comprised of VOs and their Users + Resource Providing Sites + OSG Infrastructure Providers –Broad range of sites - small universities to large national labs –Must have flexible infrastructure to meet diverse site/VO requirements –Information collection and publishing coordinated by Grid Operations Center (GOC) NERSC/LBL heavily involved in OSG Our study started out as a recommendation report for OSG, but many of the results applicable to other grids

Information Being Published Resource Selection Information Monitoring Accounting Troubleshooting Log Files Site Availability information Site Validation

Information Collection Systems in OSG GIP/CEMon Gratia Syslog-NG RSV site_verify Monalisa Others?

CEMon Periodically queries Compute Element state Publishes CE information as GIP attributes Information made public through BDII and ReSS Condor Class-Ads Used for resource selection queries

CEMon Sensitive Info Operating System version info Underlying jobmanager Internal System Paths Authentication Method All this is necessary for a successful grid query BUT: Site must understand that info is public May want to restrict level of detail to avoid a “Google hack”

Gratia OSG Accounting System Sites install local probes that report job/storage usage records to collector Information published through web interface Web interface supports custom SQL queries

Gratia - Sensitive Info User DN and local account names Job Information Risks: Users may consider job information private. If DN (or password) is compromised, it becomes very easy to discover other sites supporting the same DN.

Syslog-NG Collects grid log files at a central collector Centralized Log Collection –Troubleshooting distributed grid workflows –Security Incident Response eg. where was a compromised DN used Queriable database backend Tiered architecture

Syslog-NG Risks Log files are sensitive! Most sites want to limit access to these. –Internal system info - may expose vulnerabilities –Detailed user, software info and failure modes May not want to make these available to grid infrastructure providers –No longer under site control Tiered architecture design allows sites to set up local collectors that can filter and forward limited information to the grid

Monalisa Publishes –resource availability –load information –Performance information Public web interface. Very useful for querying the “state of the grid” at a high level. BUT May be used to target overloaded sites for DoS

RSV and Site-Verify Probes run by grid infrastructure to verify site capabilities and report on site availability –Verifies information published by CEMon –Publishes results online (VORS) Risks: Same risks as CEMon info Additionally, historical data is available - may be able to trace downtimes (when system is in transitional state).

Summary of Sensitive Info Account Names, User DNs (VORS, Gratia) Failure Modes, Security Related Details (Syslog-NG) Historical System Availability (VORS) System Load (MonALISA) Application Names, Internal Paths (Gratia, CEMon) Software Levels (CEMon)

Security Risks Gratia - public interface to Gratia DB –Track user activity on a site –Rival project can discover job information –In case of compromised cert/account, query DB for other sites with same account Syslog-NG –Internal failure modes, other logging details available to non- site personnel –Security incident details no longer private CEMon/VORS –List of valid user accounts, DNs made public –Software levels, Authn method public - possible “Google Hack” –Historical archive of system info (may be able to target recurring downtimes) MonALISA –System Load Info - DoS attack during high load

Data Protection (for Sites) Turn down logging in Syslog-NG to minimal level –Start-stop times, User DN info –Increase level for troubleshooting Customize probes to meet site requirements. –Only publish necessary information –Be AWARE of what is going out!! Modify GIP attributes –Override or Modify attributes as necessary Mask sensitive data –Use generic VO names instead of local account names Site level collectors –Review and filter, before forwarding to OSG Choose secure/encrypted publication channels

Suggestions for OSG Authenticated access to information services –Use GSI certs within browser to authenticate user –Limit access based on VO Consolidate services where possible –Minimize information streams publishing the same data –Teragrid INCA as a model? Use encrypted SSL based communication for ALL information streams –https, GSI etc. Use “robots.txt” to prevent web caching Authenticate probes using GSI hostcerts to prevent bogus information.

Conclusions Not a replacement for hard security policies –Must fix and patch software regularly –Internally monitor systems Sites should have more flexibility and control over published information OSG should consider limiting public access to user/VO based access