EGEE-II INFSO-RI-031688 Enabling Grids for E-sciencE www.eu-egee.org EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerabilities Dr Linda Cornwall,
Security Q&A OSG Site Administrators workshop Indianapolis August Doug Olson LBNL.
Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE Operational Security OSCT JSPG March 2006 Ian Neilson, CERN.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGI-InSPIRE The EGI Software Vulnerability Group (SVG) What is a Software Vulnerability?SVG membership and interaction with other groups Most people are.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks gLite Release Process Maria Alandes Pradillo.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
The Grid Services Security Vulnerability and Risk Assessment Activity in EGEE-II Enabling Grids for E-sciencE EGEE-II INFSO-RI
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Handling Grid Security Vulnerabilities in.
What if you suspect a security incident or software vulnerability? What if you suspect a security incident at your site? DON’T PANIC Immediately inform:
EGEE is a project funded by the European Union under contract IST Testing processes Leanne Guy Testing activity manager JRA1 All hands meeting,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Security Vulnerability Handling and.
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issues handling Dr Linda Cornwall CCLRC.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
9-Sep-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 9 September 2003 David Kelsey CCLRC/RAL, UK
8-Jul-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) RAL, 8 July 2003 David Kelsey CCLRC/RAL, UK
Update on the Grid Security Vulnerability Group Linda Cornwall, MWSG7, Amsterdam 14 th December 2005
Security Vulnerabilities Linda Cornwall, GridPP15, RAL, 11 th January 2006
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud Security - what is needed Linda Cornwall (STFC) and the.
INFSO-RI Enabling Grids for E-sciencE Information and Monitoring Status and Plans Plzeň, 10 July 2006 Steve Fisher/RAL.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
EGI-Engage Recent Experiences in Operational Security: Incident prevention and incident handling in the EGI and WLCG infrastructure.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
The Grid Security Vulnerability Group (GSVG) Enabling Grids for E-sciencE EGEE-III INFSO-RI Eliminating and Preventing.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks ROC Security Contacts R. Rumler Lyon/Villeurbanne.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Progress on first user scenarios Stephen.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Threat Risk Assessment Dr Linda Cornwall Rutherford Appleton.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Vulnerability handling, Risk management,
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
Security Vulnerability Identification and Reduction Linda Cornwal, JRA1, Brno 20 th June 2005
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Task tracking SA3 All Hands Meeting Prague.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid Services Security Vulnerability and.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Update Authorization Service Christoph Witzig,
Additional Services: Security and IPv6 David Kelsey STFC-RAL.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks SA3 partner collaboration tasks & process.
INFSO-RI SA2 ETICS2 first Review Valerio Venturi INFN Bruxelles, 3 April 2009 Infrastructure Support.
Security Vulnerability Detection and reduction Linda Cornwall MWSG, CERN 24 Feb 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Patch Preparation SA3 All Hands Meeting.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Best Practice and Training Mingchao Ma Operation.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MSA3.4.1 “The process document” Oliver Keeble.
Recent lessons learned: Operational Security David Kelsey CCLRC/RAL, UK GDB Meeting, BNL, 5 Sep 2006.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE Operations: Evolution of the Role of.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Study on Authorization Christoph Witzig,
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Federated Cloud and Software Vulnerabilities Linda Cornwall, STFC 20.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid is a Bazaar of Resource Providers and.
INFSO-RI Enabling Grids for E-sciencE Operational Security Coordination Team OSCT report EGEE-4, Pisa Ian Neilson, CERN.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Questionnaires to Cloud technology providers and sites Linda Cornwall, STFC,
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
EGEE-II Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Activity in Central.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI D4.4 and the EGI review Dr Linda Cornwall 19 th Sept 2011 D4.41.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks GSVG issue handling summary Dr Linda Cornwall.
David Kelsey CCLRC/RAL, UK
Directory/Inventory – info sharing for security people
SA1 Execution Plan Status and Issues
EGI Software Vulnerability Group (SVG) report to CSIRT F2F
Grid Services Security Vulnerability and Risk Analysis
Romain Wartel EGEE08 Conference, Istanbul, 23rd September 2008
EGI Security Risk Assessment
Prevention is better than Cure
Presentation transcript:

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks The Grid Security Vulnerability Group Dr Linda Cornwall, Rutherford Appleton Laboratory, Harwell Science and Innovation Campus, Didcot, OX11 OQX United Kingdom EGEE’07, Budapest, 3rd October 2007

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 2 Contents Stated aim of the GSVG in EGEE-II Setup and people involved GSVG process and Strategy Risk Assessments Some numbers What is going well What still needs improvement Issues that are not simple bugs Developers guidelines What we have learnt Any Questions?

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 3 Stated aim in EGEE-II The aim is “to incrementally make the Grid more secure and thus provide better availability and sustainability of the deployed infrastructure” –This is recognition that it cannot be made perfect immediately Main activity is to handle specific Grid Security Vulnerability issues which may be reported by anyone

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 4 Setup of the issue handling in EGEE II The GSVG issues group in EGEE II consists of Core Group Members –Run the general process –Ensure information is passed on –1 on duty each working day Risk Assessment Team (RAT) –Carry out Risk Assessments –At present 8 full RAT members –Plus 4 others which confine their work to their own area of expertise RAT people are security experts, experienced system administrators, deployment experts and developers

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 5 People involved Linda Cornwall, Stephen Burke, David Kelsey (RAL, UK) Vincenzo Ciaschini (INFN, Italy) Ákos Frohner, Maarten Litmaath, Romain Wartel (CERN) Oscar Koeroo (NIKHEF, Holland) Daniel Kouril (CESNET, Czech Republic) Kálmán Kővári (KFKI-RMKI, Hungary) Eygene Ryabinkin (RRC-KI, Russia) Åke Sandgren (HPC2N, Sweden) John Walsh (TCD, Ireland )

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 6 Process and strategy in EGEE-II – to first order Issue may be submitted by anyone – Risk Assessment carried out by the Risk Assessment Team (RAT) –GSVG investigate issue –If issue is Valid, placed in one of 4 risk categories –Extremely Critical, High, Moderate or Low Target Date for resolution set according to Risk –Fixed – 2 days EC, 3 weeks High, 3 months Moderate, 6 months Low Information kept private until advisory is released –Only RAT and those involved in resolution are informed –(Unlike pre-EGEE-II) Advisory released when issue fixed or on Target Date, whichever is the sooner –(At least for EGEE/glite software)

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 7 Types of issue For Issues that involve a bug in the gLite middleware –majority of issues are this type –Produce a special bug for JRA1 with a Risk and Target Date (TD) attached –Produce an advisory –Place the advisory on the web page when patch released or on the TD –In future we plan to send advisory to open subscription mailing list  Need to sign mails – otherwise it becomes a vulnerability! For operational issues –Produce an advisory to OSCT –OSCT inform sites as appropriate Other types of issues/concerns –Inform TCG/SCG/MWSG for discussions as appropriate

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 8 Anyone! OSCT GSVG TCG EMT + developers SCG Advisory disclosure on web Operational issue Patch available When Patch is available or on Target Date advisory placed on web Missing functionality and other general concerns are discussed with TCG and SCG, also MWSG Security bug in middleware PATCH Released Basic interactions with other groups in EGEE-II Release refers to advisory, advisory refers to release Submit issue

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 9 Risk Assessments An agreed strategy where risk assessments are objective not subjective is required Site security officers most fear an attack that gives access to the whole site –Especially if it can be carried out anonymously –DoS tends to be considered no more than medium risk A vulnerability that can be exploited by an authorized user is considered by most less serious than one that can be exploited without credentials –Especially if their actions are clearly logged We can’t ignore the possibility that credentials may be stolen Issues that can be exploited trivially and reliably are considered more serious than those that are harder to exploit and can only be exploited in rare circumstances Decided on 4 risk categories –Extremely Critical –High –Moderate –Low

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 10 4 Risk Categories Extremely Critical –Examples  Remote Root access with or without Credentials –Target Date – 2 days High –Examples  Identity theft or impersonation  Exploit against MW component that gives elevated access  Grid-wide disruption  Information leakage which is illegal or embarrassing –Target Date – 3 weeks

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 11 4 Risk Categories (contd) Moderate –Examples  Confidential issues in user information  Local DoS  Potentially serious, but hard to exploit problem. E.g. hard to exploit buffer overflow –Target Date = 3 months Low –Examples  Small system information leak  Issue which is only exploitable in unlikely circumstances, or where an exploit cannot be found  Issue where impact on service minimal –Target Date = 6 months

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 12 What we don’t do Fix software ourselves –Although some members are also involved in the software development so do fix software –Not a GSVG task Fix 3 rd party software or expect EGEE-II to fix 3 rd party software –Bug manager contacts the 3 rd parties to arrange a fix Pass on information to individual sites –Operational issues  OSCT passes appropriate info onto sites –Bug fixes  EGEE broadcasts when a release is made  release note refers to advisory –People at sites may subscribe to advisory subscription list when we get it running –But we are friendly enough and try to answer questions! Publicise information on 3 rd party software without permission from the 3 rd party Handle incidents –We attempt to help prevent incidents by getting vulnerabilities fixed

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 13 What is going well Principle is now well accepted Processing shortly after issues are submitted working well RAT carrying out good Risk Assessments Writing advisories –Starting to put them on web page Starting to release information on the TD even if a fix is not available Contact and relationships with other parties –Especially SA3, JRA1, and OSCT

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 14 Public disclosure agreed! Started in 2005 –Initially some didn’t want a vulnerability activity –Attitude was ‘if we produce a list of possible problems, sysadmins will want it, then they might not want to install software’ The GSVG deliverable (DSA1.3) approved by the EGEE PMB and accepted by the EU –Stated that for EGEE/glite s/w we will release advisories on the Target Date –Starting to do this –Getting the work approved and process accepted has been a long haul

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 15 Disclosure Policy and Target Date By carrying out Risk Assessments and setting a TD we are allowing the resolution of issues to be prioritized The TD can also be seen as the maximum length of time the issue can be lived with, without taking action On Target Date, information on the issue is made public –Regardless of whether a fix is available –This only applies to EGEE software This is to ensure confidence in the system –People less likely to discuss issues on public mailing list rather than use our system Public disclosure ensures all those who install the software have access to information on known vulnerabilities

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 16 Some numbers (28 rd Sept 2007) 122 issues entered since we started in open (42 s/w bugs, 19 more general, 1 in assessment) 60 closed (25 bug fixes, 7 operational, 6 general, 17 invalid, 5 duplicates) Risk – all those fully assessed with EGEE-II criteria –1 Extremely Critical, 9 High (2 open), 11 Moderate (8 open), 17 Low (14 open) Risk – all open s/w bugs –2 High, 8 Moderate, 14 Low, 2 not applicable, 18 Pre-EGEE2, 1 awaiting assessment Pre-EGEE2 sites informed according to pre-EGEE2 process So far put 15 advisories on web (11 past TD but no patch)

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 17 Not perfect – but improving Processing when issues fixed –Finding that some have been fixed but advisory not included in release notes –If sites are keeping software patched, some patches fixed vulnerabilities which didn’t get advisories included in release notes –Changed system a little and working well with SA3  release notes should point to advisory  release notes include affected modules and any installation info  advisory refers to “Release” Some issues not getting fixed by the Target Date –Now we are putting out the advisories on the web page. –Some have been around for a long time Some see GSVG as a bit of a ‘black hole’ –Hopefully this will improve as we are now putting advisories on the web page

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 18 What still needs improvement Some issues not a simple software bug –May require re-design, and/or a major addition to functionality to fully address –Can’t simply ask developers to patch –Most problems that have been in database for a while are well known Solutions need to be sought between TCG, SCG, and others Recent example – glexec concerns –There are concerns about whether the design/principle is appropriate and complies with policy This is main area that needs improvement –issues that have been in the system long term tend to be this type

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 19 Main areas that are not simple bugs Authorize all actions –ensure Authorization cannot be bypassed –include file and information access  Confidentiality is a big concern for some applications –several issues due to lack of R-GMA authorization  both for read and write  in development Ensure model/design is secure and complies with policy –Not a specific ‘bug’ –New EGEE security Architect

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 20 Main areas that are not simple bugs (2) Grid wide quota system is needed –Per user, per VO –Processes, file space etc per WN, Per site..  Prevents DoS from overload –And globally Better logging –More efficient incident handling  Requirement to trace original DN –Useful for users too –In work 

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 21 Main areas that are not simple bugs (3) VO code and Middleware code integrity –Ensuring sites install ‘real’ code –Users/VOs being able to ensure that when they run a job it is using code as expected –Software signing? Restricting outbound access –Prevention of Grid being used to attack other systems

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 22 Developers guidelines Wish to minimize introduction of new grid security vulnerability issues in the code In 2005 produced a document including a checklist for developers – Tended not to be used, developers have too much to do, was probably too long Change to a list of top things to watch out for e.g. – several vulnerabilities are simple file permissions  Both middleware developers and those producing yaim configuration files need to ensure file permissions are set correctly –checking input – avoiding SQL injection and XSS vulnerabilities –Still get buffer overflow vulnerabilities –ISSeG started on this – possible collaboration

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 23 What have we learnt? Vulnerability handling is a sensitive area – hard to get agreement on what we should do Even when we agree in principle what should be done, it is a lot harder to actually do it –Everything takes far longer than expected Non-trivial getting processes working well with multiple parties involved in different institutions Keep things as simple as possible –Tendency to make things too complicated –Easy to get bogged down trying to define how to cope with each type of issue and situation –Have a few basic cases, then use some common sense with those that don’t quite fit

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 24 More info The Grid Security Vulnerability Group webpage is at

Enabling Grids for E-sciencE EGEE-II INFSO-RI EGEE'07 - Linda Cornwall - The Grid Security Vulnerability Group 25 Questions ??