Security middleware Andrew McNab University of Manchester.

Slides:



Advertisements
Similar presentations
GridWorld 2006 Use of MyProxy for the FusionGrid Mary Thompson Monte Goode GridWorld 2006.
Advertisements

21 Sep 2005LCG's R-GMA Applications R-GMA and LCG Steve Fisher & Antony Wilson.
DataGrid is a project funded by the European Union CHEP 2003 – March 2003 – Grid-based access control – n° 1 Grid-based access control for Unix environments,
29 June 2006 GridSite Andrew McNabwww.gridsite.org GridSite Storage Andrew McNab University of Manchester.
29 June 2006 GridSite Andrew McNabwww.gridsite.org VOMS and VOs Andrew McNab University of Manchester.
The GridSite Toolbar Shiv Kaushal The University of Manchester All Hands Meeting 2006.
Andrew McNab - Manchester HEP - 2 May 2002 Testbed and Authorisation EU DataGrid Testbed 1 Job Lifecycle Software releases Authorisation at your site Grid/Web.
GUMS status Gabriele Carcassi PPDG Common Project 12/9/2004.
Middleware technology and software quality issues Andrew McNab Grid Security Research Fellow University of Manchester.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
The GridSite Security Framework Andrew McNab University of Manchester.
20 March 2007 VOMS etc Andrew McNabwww.gridsite.org VOMS etc Andrew McNab University of Manchester.
Andrew McNab - Manchester HEP - 6 November Old version of website was maintained from Unix command line => needed (gsi)ssh access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
EGEE Security Area 13 May 2004 EGEE Security Area Stakeholders JRA3 middleware Architecture What we have for Unix and Java What.
DONE-10: Adminserver Survival Tips Brian Bowman Product Manager, Data Management Group.
10 May 2007 HTTP - - User data via HTTP(S) Andrew McNab University of Manchester.
Andrew McNab - GACL - 16 Dec 2003 Grid Access Control Language Andrew McNab, University of Manchester
3 May 2006 GridSite Andrew McNabwww.gridsite.org Web Services for Grids in Scripts and C using GridSite Andrew McNab University of.
Security Middleware and VOMS service status Andrew McNab Grid Security Research Fellow University of Manchester.
Andrew McNab - GridPP Security - 24 Feb 2003 GridPP Security Middleware Andrew McNab, University of Manchester
Andrew McNab - SlashGrid, HTTPS, fileGridSite SlashGrid, HTTPS and fileGridSite 30 October 2002 Andrew McNab, University of Manchester
Andrew McNab - GridSite/G-HTTPS - 17 Feb 2003 GridSite and G-HTTPS update Andrew McNab, University of Manchester
Grid Security work in 2006 Andrew McNab Grid Security Research Fellow University of Manchester.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Grid Security and VO Management Andrew McNab University of Manchester.
The GridSite Security System Andrew McNab and Shiv Kaushal University of Manchester.
1 Overview of the Application Hosting Environment Stefan Zasada University College London.
Andrew McNab - Access Control - 28 May 2002 Access Control and User Management (ie Local Authorisation and Accounts) Andrew McNab, University of Manchester.
EU DataGrid (EDG) & GridPP Authorization and Access Control User VOMS C CA 2. certificate dn, ca, key 1. request 3. certificate 4. VOMS cred: VO, groups,
EGEE is a project funded by the European Union under contract IST Gap analysis draft v2 Olle Mulmo, David Groep, Joni Hahkala JRA3 Gap, 10.
Security Middleware in GridPP2 5 Feb 2004 Security Middleware in GridPP2 Current Status – GridSite GridPP2 Themes – libgridsite.
Andrew McNab - GridSite/EDG/GGF - 29 Sept 2003 GridSite, EDG and GGF Andrew McNab, University of Manchester
Security monitoring boxes Andrew McNab University of Manchester.
Grid Security in a production environment: 4 years of running Andrew McNab University of Manchester.
Andrew McNab - Security - 1 July 2003 Security: Authorization, Access Control and Usage Control Andrew McNab, University of Manchester
Andrew McNab - Grid HTTP/HTTPS extensions Grid HTTP/HTTPS extensions 18 November 2002 Andrew McNab, University of Manchester
A Web Server for Basic Grid Services D. Calvet DAPNIA/SEI, CEA Saclay Gif-sur-Yvette Cedex.
GridSite Web Servers for bulk file transfers & storage Andrew McNab Grid Security Research Fellow University of Manchester, UK.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
1 Andrea Sciabà CERN Critical Services and Monitoring - CMS Andrea Sciabà WLCG Service Reliability Workshop 26 – 30 November, 2007.
Andrew McNabSecurity Middleware, GridPP8, 23 Sept 2003Slide 1 Security Middleware Andrew McNab High Energy Physics University of Manchester.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Services Security A. Casajus R. Graciani. 12/12/ Overview DIRAC Security Infrastructure HSGE Transport Authentication Authorization DIRAC Authorization.
Andrew McNabGrid in 2002, Manchester HEP, 7 Jan 2003Slide 1 Grid Work in 2002 Andrew McNab High Energy Physics University of Manchester.
INFSO-RI Enabling Grids for E-sciencE ARDA Experiment Dashboard Ricardo Rocha (ARDA – CERN) on behalf of the Dashboard Team.
VO Box Issues Summary of concerns expressed following publication of Jeff’s slides Ian Bird GDB, Bologna, 12 Oct 2005 (not necessarily the opinion of)
Grid Security work in 2004 Andrew McNab Grid Security Research Fellow University of Manchester.
Security Middleware 3 June 2004 Security Middleware Current Status – GridSite deployments – Architecture GridPP2 – Web services.
INFSO-RI Enabling Grids for E-sciencE EGEE is a project funded by the European Union under contract IST Job sandboxes.
GRID Security & DIRAC A. Casajus R. Graciani A. Tsaregorodtsev.
Security Middleware Andrew McNab University of Manchester.
Andrew McNab - HTTP/HTTPS extensions HTTP/HTTPS as Grid data transport 6 March 2003 Andrew McNab, University of Manchester
Andrew McNab - Dynamic Accounts - 2 July 2002 Dynamic Accounts in TB1.3 What we could do with what we’ve got now... Andrew McNab, University of Manchester.
SESEC Storage Element (In)Security hepsysman, RAL 0-1 July 2009 Jens Jensen.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Mario Reale – GARR NetJobs: Network Monitoring Using Grid Jobs.
9/21/04 James Gallagher Server-Side: The Basics This part of the workshop contains an overview of the two servers which OPeNDAP has developed. One uses.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
GridSite status Andrew McNab University of Manchester.
EGEE is a project funded by the European Union under contract IST Datamat Status Report F. Pacini Datamat S.p.a. Milan, IT-CZ JRA1 meeting,
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Third Party Transfers & Attribute URI ideas
Web Development Web Servers.
CRC exercises Not happy with the way the document for testbed architecture is progressing More a collection of contributions from the mware groups rather.
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Chapter 27: System Security
APACHE WEB SERVER.
Shiv Kaushal, University of Manchester
Presentation transcript:

Security middleware Andrew McNab University of Manchester

6 July 2005Security middleware Outline GridSite features in gLite 1.2 Some features in detail HTTP Downgrade Web service support suexec and gsexec Secmon boxes

6 July 2005Security middleware GridSite in gLite 1.2 Up to date VOMS support Attribute Certificates from gLite/LCG VOMS XML access policies written in GACL or XACML File access / scripts / services controlled by X.509, GSI Proxy, VOMS AC, DN List credentials. HTTP Downgrade Authentication via HTTPS; bulk file copy via HTTP gsexec Run scripts/services in Unix user sandboxes

6 July 2005Security middleware HTTP Downgrade This is mostly code from last summer Renewed interest in bulk HTTP so we're revisiting it Idea is to offer similar functionality to GridFTP but using standard HTTP(S) tools HTTPS control channel used for authentication Returns a one-time passcode as a cookie HTTP GET or PUT request made with passcode Similar to unencrypted GridFTP data channel But with Apache performance benefits: sendfile() etc

6 July 2005Security middleware HTTP Downgrade (2) Intend to add support for third-party copies Use COPY method from RFC 2518 (WebDAV) Passcode used to authenticate the remote leg of the copy Add HTTP header with client's estimate of Round Trip Time Used by server to select correct TCP window size Work ongoing with networking (Richard Hughes-Jones etc) to demonstrate performance of HTTP on WANs Evangelise about this a bit more... eg GridSite's htcp command now used by EGEE WMS

6 July 2005Security middleware Web Service support GridSite architecture can provide security for Web Service tools like gSOAP, with CGI Web Services We also provide the C/C++ implementation of the EGEE / JRA3 Delegation portType Java implementation by funded part of JRA3 mod_gridsite + delegation CGI used by EGEE WMS: Apache/FastCGI; GridSite (security); gSOAP (SOAP/WS) Delegated credentials stored in the filesystem Allows sharing between different CGI languages

6 July 2005Security middleware suexec and gsexec Apache has traditionally provided a wrapper to run CGIs as other Unix users: Start as root, process as apache, CGI as joeuser We've modified this to run CGI scripts and services as pool Unix users Either per-client: the cert in the browser determines which pool user Or per-directory: all the CGIs in my directory run as the same pool user

6 July 2005Security middleware suexec / gsexec (2) This allows us to sandbox CGI-based services by ensuring that the pool users are of sufficiently low privilege Different clients or service owners can't interfere with each other Access control is still via GACL/XACML policy files X.509, GSI Proxy, VOMS, DN List credentials We can now offer third-party hosting of services Give a user or VO access to a privileged directory They deploy their C/C++/Perl/Python services remotely

6 July 2005Security middleware GRACE In adding support for Web Services to GridSite, we started to offer non-Java ways of building service-orientated grids We're now at the point where this is being taken up Clearly, this community has a big investment in languages other than Java But many other scientists and admins do too So again, want to start evangelising about this model GRACE: GRidsite/Apache/CGI-scripts/Executables

6 July 2005Security middleware SECMON boxes Had hoped to have SECMON box prototype ready for this meeting Expect DVD images available in the next week or two Aim is to provide a simple to install security monitoring box that just sits in the corner of your machine room Sites don't need to install anything special on CE etc being monitored Remote administration / monitoring done by Tier-2/Tier-1 staff, but site retains root

6 July 2005Security middleware SECMON design Want to keep things as simple as possible Unix syslog already provides almost all of what we need Always installed Logs from services/daemons and kernel (port scans etc) Logging interfaces for scripts, C/C++ etc One line added to syslog.conf can direct the messages over the network to local SECMON box So we need to provide remote config tools and remote access to log files

6 July 2005Security middleware secmon.conf All configuration in one place All local choices can be recovered from this file May want to freeze SECMON hard drive to use as evidence for the Police, so this may be important secmon.conf currently defines firewall rules for syslogd, sshd and httpd services to log (globus-gatekeeper etc) X.509 DNs of people with different privilege levels

6 July 2005Security middleware Implementation secmond runs as root monitors secmon.conf for changes updates config files as a result filters syslog messages into log files according to service name (sshd, httpd, globus-gatekeeper etc) Admin CGI (secmon-admin.cgi) runs as user apache manages secmon.conf RSS CGI (secmon-rss.cgi) runs as user apache All remote access controlled by GridSite/GACL policies

6 July 2005Security middleware RSS Access RSS is widely used to allow clients to pull categorised, chronological data (like news headlines) out of webservers, in a programmatic way Well matched to transporting syslog type alert messages secmon-rss.cgi queried by service name, severity and/or date range Only pull out the level of detail we need Seeks / bisects / reads log file directly to find messages Access control currently via X.509/GSI Proxy only

6 July 2005Security middleware Summary The current version of GridSite is part of the latest gLite release process We're providing a system which is used by other middleware, not just websites Non-Web Service tools from GridSite (htcp etc) are starting to be used too SECMON box prototype is almost ready