An idea for access control enhancement on the EPICS Accelerator Group J-PARC, JAERI April 2004.

Slides:



Advertisements
Similar presentations
1 Hyades Command Routing Message flow and data translation.
Advertisements

SNS Integrated Control System SNS RDB Requirements, wish list, status A little history l Oracle RDB used exclusively by accelerator physics group l JERI.
Recruitment Booster.
Client Server. Server Client Model Servers- Wait for requests from clients - Sends requested data to client - May have to communicate with other servers.
1 1999/Ph 514: Channel Access Concepts EPICS Channel Access Concepts Bob Dalesio LANL.
More on Processes Chapter 3. Process image _the physical representation of a process in the OS _an address space consisting of code, data and stack segments.
EPICS Base R and beyond Andrew Johnson Computer Scientist, AES Controls Group.
IPv6 – IPv4 Network Address, Port & Protocol Translation & Multithreaded DNS Gateway Navpreet Singh, Abhinav Singh, Udit Gupta, Vinay Bajpai, Toshu Malhotra.
TDPS Wireless v Enhancements E1 - Multi load E2 - Driver time scheduler.
Slow Control LHCf Catania Meeting - July 04-06, 2009 Lorenzo Bonechi.
Current Status of Virtual Accelerator at J-PARC 3 GeV Rapid Cycling Synchrotron H. Harada*, K. Shigaki (Hiroshima University in Japan), H. Hotchi, F. Noda,
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Gu & Maher University of Sydney, September 2004 DECO2005 Co-Authoring and Changes Management in ArchiCAD Teamwork.
Z39 Server DigiTool Version 3.0. Z39 Server 2 z39 SERVER Main Topics z39 server architecture z39 server services z39 server configuration Defining a new.
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
Chapter 8 Administering TCP/IP.
Inter Process Communication:  It is an essential aspect of process management. By allowing processes to communicate with each other: 1.We can synchronize.
Internet Networking Spring 2003
Multiple Processor Systems 8.1 Multiprocessors 8.2 Multicomputers 8.3 Distributed systems.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Brian Martlew 25 th Sept 2006 MICE Control & Monitoring Plan Brian Martlew.
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
Figure 1. Hit analysis in 2002 of database-driven web applications Hits by Category in 2002 N = 73,873 Results Reporting 27% GME 26% Research 20% Bed Availability.
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Doc.: IEEE /1065r0 Submission November 2005 Emily Qi et alSlide 1 Proposal for Load Balancing Notice: This document has been prepared to assist.
The University of New Hampshire InterOperability Laboratory Serial ATA (SATA) Protocol Chapter 10 – Transport Layer.
Process-to-Process Delivery:
Bootstrap and Autoconfiguration (DHCP)
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Database Programming in Java Corresponds with Chapter 32, 33.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Chapter Nine The Session Layer. Objectives We’ll see how a new session is created, maintained, and dismantled. The process of logon authentication will.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Mobile-initiated and network-initiated handover procedure Date.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
LiveCycle Data Services Introduction Part 2. Part 2? This is the second in our series on LiveCycle Data Services. If you missed our first presentation,
TANGO on embedded devices: the Bimorph Mirror application case Fulvio Billè Roberto Borghes, Roberto Pugliese, Lawrence Iviani Instrumentation & Measurement.
1 SNL Current State (in transition state) By Matthias Clausen Ron Chestnut.
Virtual Accelerator at J-PARC 3 GeV Rapid Cycling Synchrotron H. Harada*, K. Shigaki (Hiroshima University in Japan), H. Hotchi, F. Noda, H. Sako, H. Suzuki,
10/20/2015J-PARC1 Control Room Accelerator Physics Channel Access – Connection to Hardware Through EPICS Getting Information directly from the Control.
Analysis of SQL injection prevention using a filtering proxy server By: David Rowe Supervisor: Barry Irwin.
Othman Othman M.M., Koji Okamura Kyushu University 1.
Synchronization Methods in Message Passing Model.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Chapter 4: SQL Complex Queries Complex Queries Views Views Modification of the Database Modification of the Database Joined Relations Joined Relations.
EPICS EPICS Limitations Bob Dalesio Marty Kraimer.
EPICS Release 3.15 Bob Dalesio May 19, Features for 3.15 Support for large arrays - done for rsrv in 3.14 Channel access priorities - planned to.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
1 Client-Server Interaction. 2 Functionality Transport layer and layers below –Basic communication –Reliability Application layer –Abstractions Files.
1 Current Status of The Control System for J-PARC Accelerator Complex Hiroshi YOSHIKAWA J-PARC Center at KEK/JAEA October 16, 2007 ICALEPCS2007 at Knoxville.
1 1999/Ph 514: Flow of Control EPICS Flow of Control Marty Kraimer APS.
18. June 2003EPICS WS Channel Management Andreas Lüdeke Swiss Light Source / PSI 20 May 2003 EPICS Collaboration Meeting.
1. LabVIEW and EPICS Workshop EPICS Collaboration Meeting Fall 2011.
Mapping IP Addresses to Hardware Addresses Chapter 5.
Network Architecture Protocol hierarchies Design Issues for the layers
Web Services An Introduction Copyright © Curt Hill.
Connecting LabVIEW to EPICS network
Reliable Client-Server Communication. Reliable Communication So far: Concentrated on process resilience (by means of process groups). What about reliable.
Network Layer: Address Mapping, Error Reporting, and Multicasting
1 Channel Access Concepts – IHEP EPICS Training – K.F – Aug EPICS Channel Access Concepts Kazuro Furukawa, KEK (Bob Dalesio, LANL)
CNNIC Chinese Domain Name Registration System Zhang Wenhui CNNIC China Internet Network Information Center.
1 EPICS Flow of Control: EPICS Workshop at IHEP, Beijing, August 2001 EPICS Flow of Control Marty Kraimer APS.
Tzu-Han Wu Yi-Chi Chiang Han-Yang Ou
Channel Access Security 2006 O AK R IDGE N ATIONAL L ABORATORY U. S. D EPARTMENT OF E NERGY 2 Channel Access Security  The IOC Application.
Process-to-Process Delivery:
Monitoring Dynamic IOC Installations Using the alive Record Dohn Arms Beamline Controls & Data Acquisition Group Advanced Photon Source.
Process-to-Process Delivery:
Beam Synchronous Acquisition on IOC
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

An idea for access control enhancement on the EPICS Accelerator Group J-PARC, JAERI April 2004

Why enhancement is required?  Requirement from high-intensity proton machine: (Mega-Watt class machine) There is a target value for effective dose in J-PARC. (0.25µSv/hour) In our 50GeV synchrotron, effective dose when 100% loss will be 49µSv/pulse. Loss of a beam pulse causes waste of machine time for 200 hours. We are not allowed to mistake on operation at all. We need anything to reduce possibility of operation error as low as possible. So, access control enhancement by using exclusive operational right is required to achieve more safe operation.

What is the exclusive operational right? First come, first serve...  Each critical records have a property of access control called “ exclusive operational right. ”  A client connected to a record at first have an exclusive operational right (right to write) and can full access.  A client connected on and after second have no exclusive operational right and can not write access to a record. (but can read access) IOC OPI 1st × 2nd

Exclusive operational right  Requirements: An operation (write access) to a record must be permitted only for one operator at a time. An operational right must be passed to another operator. An operational right must be force released by supervisor if need. Status of operational right should be shown for others.

A plan to implement  Step by step strategy: Phase 1 Minimum modification to make full use of existing EPICS resources. Phase 2 Full spec implementation.

Phase 1: A tentative implementation  Outline: Changes of operational right is notified by using CA_PROTO_ACCCESS_RIGHTS packet. Modify the CA Server program a bit No modification on CA protocol No modification on AS files  Merit No compatibility problems No need to modify existing clients  Demerit All of records on an IOC may take effect No legal way to know who has the right

Phase 1 implementation: procedure to pass a right  Points: Pass the right to another client when right holding channel was disconnected. (Because existing clients could not take the right themselves.)  Procedure:  CAS (CA Server) choose a client within current connected channels to pass the right when right holder client was disconnected.  CAS send an ACCESS_RIGHTS packet to the client.

Phase 1 implementation: trick to force pass a right  Points: Assign an user who has privilege to force release operational rights. Force release current operational right when channel is connected from privileged user. (Because existing clients could not return the right themselves.)  Procedure:  CAS send an ACCESS_RIGHTS packet to right holder client when the right was released.  CAS choose a client within current connected channels to pass the right.  CAS send an ACCESS_RIGHTS packet to the client.

Phase 2: A proposal implementation  Outline: Add a new command to CA protocol  new CA_PROTO_RIGHT_CONTROL  existing CA_PROTO_ACCESS_RIGHTS also used Add new keywords in AS file  to specify record need or not need operational exclusion  to specify privileged user  Merit realize all of requirements  Demerit right control dialogue are desired on GUI ’ s too hard to update all of existing clients

Phase 2 implementation: new CA_PROTO_RIGHT_CONTROL packet the ‘ type ’ field is abused for sub-command query(0)query current status of right. replay packet have payload request(1)request for a right return(2)return/pass a right deny(3)deny request for a right force(4)request for a right (force) cmd (28)size (variable) type (variable)count (0) cid (variable) sid (variable) “ username\0hostname\0 ” ( )

Phase 2 implementation: procedure to pass a right  A following client send a RIGHT_CONTROL/request packet to CAS.  CAS relay the packet to a client who has operational right. Note that Channel Access has no way of inter- client communication, so CAS should relay it.  The right holder client returns a RIGHT_CONTROL/return or /deny reply packet according to decision of permit or deny. Note that this decision possibly done by operator.  After right returned, CAS send an ACCESS_RIGHT packet to the previous client.  CAS relay the RIGHT_CONTROL packet to following client. And also send an ACCESS_RIGHT packet when operational right is passed.

Phase 2 implementation: procedure to pass a right (accept) following client CAS right holder RIGHT_CONTROL /request RIGHT_CONTROL /request RIGHT_CONTROL /return RIGHT_CONTROL /return ACCESS_RIGHTS

Phase 2 implementation: procedure to pass a right (deny) following client CAS right holder RIGHT_CONTROL /request RIGHT_CONTROL /request RIGHT_CONTROL /deny RIGHT_CONTROL /deny

Phase 2 implementation: procedure to force release a right  A following client send a RIGHT_CONTROL/force packet to CAS. Note that following client must have privilege.  CAS relay the packet to a right holder client. No reply from the right holder client at this point.  CAS send an ACCESS_RIGHT packet to the right holder client.  CAS send a RIGHT_CONTROL/return packet and an ACCESS_RIGHT packet to following client.

Phase 2 implementation: procedure to force release a right following client CAS right holder RIGHT_CONTROL /force RIGHT_CONTROL /force RIGHT_CONTROL /return ACCESS_RIGHTS

Phase 2 implementation: procedure to return a right  Right holder client send a RIGHT_CONTROL/return packet to CAS.  CAS send an ACCESS_RIGHT packet to client.

Phase 2 implementation: procedure to return a right right holder CAS other clients RIGHT_CONTROL /return ACCESS_RIGHTS

Phase 2 implementation: procedure to query status of a right  A client send a RIGHT_CONTROL/query packet to CAS.  CAS returns a RIGHT_CONTROL/query packet with right holder information.

Phase 2 implementation: procedure to query status of a right clientCAS other clients RIGHT_CONTROL /query RIGHT_CONTROL /query