Blueprint Meeting Notes Feb 20, 2009. Feb 17, 2009 Authentication Infrastrusture Federation = {Institutes} U {CA} where both entities can be empty TODO1:

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Scaling TeraGrid Access A Testbed for Attribute-based Authorization and Leveraging Campus Identity Management
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Security Q&A OSG Site Administrators workshop Indianapolis August Doug Olson LBNL.
OSG PKI RA Training Mine Altunay, Jim Basney OSG PKI Team October 1, 2012.
Report on Attribute Certificates By Ganesh Godavari.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
OSG Area Coordinators Meeting Security Team Report Mine Altunay 04/02/2014.
Grid Security Users, VOs, Sites OSG Collaboration Meeting University of Washington Bob Cowles August 23, 2006 Work supported.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April
OSG Area Coordinators Meeting Security Team Report Mine Altunay 05/15/2013.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Jan 2010 Current OSG Efforts and Status, Grid Deployment Board, Jan 12 th 2010 OSG has weekly Operations and Production Meetings including US ATLAS and.
A Model for Grid User Management Rich Baker Dantong Yu Tomasz Wlodek Brookhaven National Lab.
WLCG Security TEG, risks and Identity Management David Kelsey GridPP28, Manchester 18 Apr 2012.
Key Accomplishments and Work Plans OSG Security Team July 11, 2012.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 01/29/2014.
CILogon OSG CA Mine Altunay Jim Basney TAGPMA Meeting Pittsburgh May 27, 2015.
OSG Area Coordinators Meeting Security Team Report Kevin Hill 08/14/2013.
OSG Security Review Mine Altunay June 19, June 19, Security Overview Current Initiatives  Incident response procedure – top priority (WBS.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 12/21/2011.
OSG Security Program Review OSG Security Team M. Altunay, FNAL, OSG Security Officer, D. Olson LBNL, Ron Cudzewicz FNAL J. Basney NCSA, Anand Padmanabhan.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 06/25/2014.
Pass SOX security audits and Improve XA security CISTECH Security Solutions Belinda Daub, Senior Consultant Technical Services
Publication and Protection of Site Sensitive Information in Grids Shreyas Cholia NERSC Division, Lawrence Berkeley Lab Open Source Grid.
OSG Security Kevin Hill. Goals Operational Security – Identify software vulnerabilities – observing the practices of our VOs and sites, and sending alerts.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
G RID M IDDLEWARE AND S ECURITY Suchandra Thapa Computation Institute University of Chicago.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
OSG Security Review Mine Altunay December 4, 2008.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay OSG Security Officer.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
8-Jul-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) RAL, 8 July 2003 David Kelsey CCLRC/RAL, UK
OSG PKI Contingency and Recovery Plans Mine Altunay, Von Welch October 16, 2012.
Introduction to OSG Security Suchandra Thapa Computation Institute University of Chicago March 19, 20091GSAW 2009 Clemson.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 11/02/2011.
Mine Altunay July 30, 2007 Security and Privacy in OSG.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Meeting Minutes and TODOs TG has no distributed monitoring. During incident response, use a manual twiki page to distribute information TG monitors the.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
VO Box Issues Summary of concerns expressed following publication of Jeff’s slides Ian Bird GDB, Bologna, 12 Oct 2005 (not necessarily the opinion of)
Grid Security and Identity Management Mine Altunay Security Officer, Open Science Grid, Fermilab.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Open Science Grid Build a Grid Session Siddhartha E.S University of Florida.
OSG Area Coordinators Meeting Security Team Report Mine Altunay 02/13/2012.
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay, James Basney,
OSG PKI Transition Impact on CMS. Impact on End User After March , DOEGrids CA will stop issuing or renewing certificates. If a user is entitled.
OSG Security: Updates on OSG CA & Federated Identities Mine Altunay, PhD OSG Security Team OSG AHM March 24, 2015.
OSG PKI Transition Mine Altunay OSG Security Officer
OSG Area Coordinators Meeting Security Team Report Mine Altunay 8/15/2012.
Running User Jobs In the Grid without End User Certificates - Assessing Traceability Anand Padmanabhan CyberGIS Center for Advanced Digital and Spatial.
OSG VO Security Policies and Requirements Mine Altunay OSG Security Team July 2007.
Certificate Security For Users Obtaining and Using Your Personal Certificate using the OSG PKI Kyle Gross – OSG Operations Support Lead Elizabeth Prout.
New OSG Virtual Organization Security Training OSG Security Team.
IGTF Risk Assessment Team 5/11/091.
Software Tools Group & Release Process Alain Roy Mine Altunay.
OGF PGI – EDGI Security Use Case and Requirements
OSG Security Kevin Hill.
Update on EDG Security (VOMS)
Leigh Grundhoefer Indiana University
Presentation transcript:

Blueprint Meeting Notes Feb 20, 2009

Feb 17, 2009 Authentication Infrastrusture Federation = {Institutes} U {CA} where both entities can be empty TODO1: when we remove a CA, what is the procedure in OSG to follow? Is this written anywhere? TODO2: how site admins can measure the health of their sites? OSG should provide a checklist! TODO3: CA audits. How much effort and planning? Estimate the effort and start with Purdue CA auditing. Mine and Jim will make a trip to Purdue for the nanoHub collaboration. The audit will not be called an audit but a review of the CA. we will look for reasons to remove the CA. TODO4: which CAs we trust with our core services? Which CAs our core services recognize? Is this identical to our acceptance of CAs policy or is there a subset? TODO5: what would happen if a Vo stops trusting a CA? how is this propagated in OSG? TODO6: write down the procedure to include a new CA which is used by a VO in OSG Should the VO trust the federation or the CA? Decision on whether to experiment with TeraGrid Shib testbed. By discussing and analyzing the conceptual work we are already making a contribution. –Our short term contribution will be TODO: exploring why InCommon authentication information is not enough to grant IGTF accredited certificates to end users. Currently, IGTF accredited Shibboleth CAs vet the end user identity in additional mechanisms. Our request to InCommon and IGTF is to explore ways such that an accredited ShibCA would not have to do additional identity vetting In terms of Frank’s requirement of installing on CAs that are used by a VO –The problem with this is to discover the service certificates used by a VO. –We already have means to find out which user certificates are issued by which CAs –TODO7: for users that do not have matching CAs, automate ticket generation process –VO needs a place to declare why their job failed due to unrecognized CAs. Hen we can create VO-based CA packages to distribute. –A typical problem is a WN trying to connect to the gridFTP server run by the VO. If the WN did not have the CA cert installed, WN connection will be aborted by the FTP server. This is because application is trying to bring its own trust domain on top of the WN –TODO8 a blueprint meeting on logging capability in OSG. This is requested to ED

In terms of Frank’s requirement: we are not sure even if we implemented this right away, he would be able to use it. Because his sites are bound to respect WLCG policy of installing all IGTF CAs. Frank earlier asked for identifying the CAs that are actively used and only installing those. TODO9: ask Frank if he is still asking for this requirement. Given CRL failures are no longer critical errors and installed CAs are checked against the GOC distribution, he may give up on this requirement. –Even if this requirement stays valid, security team will nto start implementing until Ruth arranges the VOs to register their services with OSG TODO7 still remains valid. WN CAs job url_copy *CA GridFTP Bring your own CA ? Utility

Feb 18, 2009 TODO10: Security threat model. On the discussion of requiring voms proxy or plain proxy –How many of our sites use GUMS and how many uses flat gridmapfiles. Is the security information included in information services sufficient? –There is no VO complaining on this so far –Users can be mapped into different identities because a site uses flat map files and another uses gums. However, we have not heard any user complaints yet. Why? –Until we hear complaints, we will only check what type of security information is published in information services On the operational question of who is responsible for ensuring security infrastructure is up and running –Things that are not a threat to our infrastructure and production are not monitored by the security team; they will be monitored by operations team. Security team’s operations are restricted to threats to our security infrastructure –TODO11: list what constitutes the operational duties performed by security team OSG provides an important service to the community in obtaining certificates. OSG security team provides the RA service. TODO12: Include audit of RA flow in ST&E list. Perform an audit of the RA flow. –Explain how GOC acts as an RA and document the services performed by OSG RA and GOC. TODO13: Understand OSG sites’ requirements regarding to the identity vetting process during the certificate issuance. TODO14: understand the affect of a compromise or outage at DOEGrids CA. –TODO15: Explore having voms-proxies tied to the the user’s original certificate may be useful in such outages to keep production going for a short while. –During the outage, there won’t be any new certs issued by the CA or by the VOMS server. - TODO16: test whether we can revoke 2500 certs all at once. If we can ban them via CRL checks. Perform tests with a student. CA compromiseRecovery start

On the Banning Tool –TODO17: write a design document. That explains The weakness or inherent risks of our design Push vs pull model and the paradigm shift that it brings if we go along with push model Whether applying banning after the authentication step is too late or not TODO18: Explore providing CRLs to sites as a service. The benefit of this is to monitor which sites are downloading their CRLs. The log files of the service would tell us which sites have already downloaded or not. Instead of asking sites to run RSv probes and sends us results, this would be an easier way to monitor site’s due diligence. TODO19: Ask Miron and Ruth to examine and go through each incident post mortem report. TODO20: Write procedures on what makes a site get kicked out of OSG. Which operational requirements are necessary to meet in order to stay as an OSG site. E.g. GOC has the rule of “3-calls-missed-you-are-out”. What is it that security’s three strike’s rule? On the software security –Which vulnerability examining tools to purchase, who will look at the tool’s results?