D u k e S y s t e m s GENI Federation Basics Jeff Chase Duke University.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
D u k e S y s t e m s Some tutorial slides on ABAC Jeff Chase Duke University.
Sponsored by the National Science Foundation Campus Policies for the GENI Clearinghouse and Portal Sarah Edwards, GPO March 20, 2013.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
D u k e S y s t e m s Authorization Framework: Status Jeff Chase Duke University.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Securing the Broker Pattern Patrick Morrison 12/08/2005.
Sponsored by the National Science Foundation GENI Clearinghouse Panel GEC 12 Nov. 2, 2011 INSERT PROJECT REVIEW DATE.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Introduction To Windows NT ® Server And Internet Information Server.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
D u k e S y s t e m s Accountability and Authorization GEC 12 Jeff Chase Duke University Thanks: NSF TC CNS
D u k e S y s t e m s Building the GENI Federation with ABAC: Going Deeper Jeff Chase Duke University Thanks: NSF TC CNS
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Digital Object Architecture
1 GENI Operational Security GEC4 Stephen Schwab Miami, Florida.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
D u k e S y s t e m s A Tale of Two Federations Jeff Chase Duke University.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
Federation Strategy Robert Ricci GENI-FIRE Workshop September 2015.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
GEC3www.geni.net1 GENI Spiral 1 Control Frameworks Global Environment for Network Innovations Aaron Falk Clearing.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
D u k e S y s t e m s ABAC: An ORCA Perspective GEC 11 Jeff Chase Duke University Thanks: NSF TC CNS
Sponsored by the National Science Foundation GEC16 Plenary Session: GENI Solicitation 4 Tool Context Marshall Brinn, GPO March 20, 2013.
Sponsored by the National Science Foundation Enabling Trusted Federation Marshall Brinn, GENI Program Office October 1, 2014.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Sponsored by the National Science Foundation GENI Spiral 4 Architecture Plan Marshall Brinn, GPO
Sponsored by the National Science Foundation Towards Uniform Clearinghouse APIs GEC17 Developer Working Sessions July 23,
Sponsored by the National Science Foundation GENI Security Architecture What’s Up Next? GENI Engineering Conference 7 Durham, NC Stephen Schwab SPARTA/Cobham.
D u k e S y s t e m s Building the GENI Federation With ABAC Jeff Chase Duke University Thanks: NSF TC CNS
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Sponsored by the National Science Foundation Cluster D Working Meetings GENI Engineering Conference 5 Seattle, WA July ,
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Sponsored by the National Science Foundation Introduction to GENI Architecture: Federated Trust Perspective Marshall Brinn, GPO GEC20: June 24, 2014.
Sponsored by the National Science Foundation Meeting Introduction: Integrating GENI Networks with Control Frameworks Aaron Falk GENI Project Office June.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Sponsored by the National Science Foundation 1 Nov 4, 2010 Cluster-D Mtg at GEC9 Tue, Nov 2, 12noon – 4:30pm Meeting Chair: Ilia Baldine (RENCI) –System.
Sponsored by the National Science Foundation Establishing Policy-based Resource Quotas at Software-defined Exchanges Marshall Brinn, GPO June 16, 2015.
Virtualization as Architecture - GENI CSC/ECE 573, Sections 001, 002 Fall, 2012 Some slides from Harry Mussman, GPO.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Sponsored by the National Science Foundation 1 March 15, 2011 GENI I&M Update: I&M Service Types, Arrangements, Assembling Goals Architecture Overview.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
D u k e S y s t e m s Some Issues for Control Framework Security GEC7 Jeff Chase Duke University.
OGF 43, Washington 26 March FELIX background information Authorization NSI Proposed solution Summary.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Designing a Federated Testbed as a Distributed System Robert Ricci, Jonathon Duerig, Gary Wong, Leigh Stoller, Srikanth Chikkulapelly, Woojin Seok 1.
Sponsored by the National Science Foundation ABAC and GPO Clearinghouse Authorization Marshall Brinn, GPO GEC20: June 22, 2014.
Sponsored by the National Science Foundation GEC17 Plenary Session: Architecture Marshall Brinn, GPO July 22, 2013.
Cryptography and Network Security
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
GENI Exploring Networks of the Future
Presentation transcript:

D u k e S y s t e m s GENI Federation Basics Jeff Chase Duke University

Preface This slide deck has some introductory slides for a longer series on authorization and trust management in GENI. It contains:  A few Big Picture slides from the GPO, which I find useful  Basic GENI concepts: aggregates, slices, projects, clearinghouse  Some basic material defining terms and concepts for trust management based on principals speaking with public keys. There shouldn’t be anything new and controversial here for anybody who has been involved in the GENI process. But it isn’t a good introduction to GENI either. It’s only purpose is to ground some terms and concepts for a larger discussion.

3 The GENI Vision A suite of infrastructure for long-running, realistic experiments in Network Science and Engineering Mobile Wireless Network Edge Site Sensor Network Federated International Infrastructure Federated substrate with end-to-end virtualized “slices” Heterogeneous, and evolving over time via spiral development Deeply programmable Virtualized 2007 “aggregates”

“GENI from First Principals” This series is about trust management in GENI. How to think about principals and trust Declarative trust policies with automated inference Federation architecture addressing these goals: 1.Be flexible enough to represent a wide range of trust structures for multi-domain infrastructure services. 2.Implement GENI spiral 4 governance mandate as deployment-time policy with a rigorous specification. 3.Evolve to decentralize GENI-like services over time. 4.Grow richer structures around GENI by allowing others to join the system and contribute on their own terms. 5.Declare new trust structures without changing code.

IdP.faculty  D SA Reading the slides IdP.student  T GENI users Test Tube Guy and Dr. D, and some of their credentials A coordination service implementing some clearinghouse function, such as a Slice Authority Indicates trust of one principal in another, often associated with some kind of formal agreement: Indicates a request Indicates credential flow A A generic principal AM Aggregate

Basic concepts A principal is any entity that may: – Request an action – Respond to a request – Assert or receive a statement – Know a secret Trust is that which a principal must have in order to: – Honor a request – Accept a response – Believe a statement – Reveal a secret trusts Trust is usually limited to a particular function or purpose, which we would like to specify rigorously. A AB

Example: client/server trust A server accepts a request only if it trusts the client to issue it. Server’s guard authenticates the client and checks each client request for compliance with an authorization policy. ClientServer compliance check trusts Each entity chooses its own policy. How to represent it and check compliance? reference monitor request Guard

Example: client/server trust ClientServer A client must also trust its servers to provide the requested service, protect private data, and return a correct response. trusts C We often think of client trust policies as being very simple... …but they’re not.

Trust graph Trust may derive from a trust path through one or more intermediate principals that endorse another party. ClientServer Each step in the trust path follows a delegation of trust from a principal to its successor in the path, specified by its policy. We would like to constrain each delegation and specify rigorously and exactly what trust is delegated.

Sponsored by the National Science Foundation 10 GENI on the back of a napkin Standard issue BBN napkin Chip GEC4

Bidirectional trust based on agreements GENI trust structure: overview AM Users and tools Principals are users, servers, and organizations. Principals are actors: subjects. Generically: entities. Users create global slices and request aggregates to bind local resources to those slices. GENI Federation Oversight GENI Clearinghouse GENI Meta- Operations GENI I&M and Other Services

We are concerned with three kinds of GENI principals. 1. Aggregates and other services. – Focus on infrastructure services, not hosted applications. 2. Users (researchers, experimenters) – “User” is my shorthand for any human principal acting as a client of an infrastructure service. – Users may control/operate services and/or form groups. 3. GENI Oversight and Coordination (GOC) – “GOC” is my shorthand for the GENI root authority. E.g., GMOC, GFOC – Clearinghouse is shorthand for “that which manages federation”, i.e., GOC-affiliated coordination services. GENI Principals

Slices Resources are allocated to slices. – Each slice is created by a user, who owns it. – The slice owner may delegate permissions to operate on the slice. A slice can host an application or service. – In principle, slices (or hosted services) can be subjects in the authorization framework. – Out of scope for now… A slice is a global object that is a target of local operations at each aggregate.

Slices as principals Can user software running within a slice invoke GENI interfaces? Can slices offer infrastructure services? In principle, slices can be subjects in the authorization framework. – This will be useful. – The question of how to build trust in slices (e.g., through attestation) is an important and interesting research topic. – But this topic is out of scope for now. The problem with slices as principals is that we have little basis to say anything about any public keys they speak with, or what trust to place in those keys.

Projects All GENI activity is organized into projects. – Clearinghouse service registers/endorses projects – Every user action is taken within the scope of a project. Each project has a designated leader (e.g., PI). – The leader is accountable for activity in the project. – The leader may set policies for the project. – The leader may delegate management rights and/or organize the project and its members into subgroups. GENI policies may consider project identity, e.g., for resource allocation as well as authorization.

Clearinghouse Functions A. Auditing and accountability B. Brokering requests and allocations C. Credentialing users and services D. Discovery/Directory of resources/services Let’s take them one at a time… Clearinghouse GEC-12

Clearinghouse Functions A. Auditing and accountability GOC receives event logs (audit trails) distributed by pub/sub. Avoid central authorization services where we can. B. Brokering requests and allocations Resource quotas/caps, sharing policies: rarely discussed in GENI. ORCA uses ticket-granting brokers. Central authorization services are useful here! C. Credentialing users and services Federated identity (e.g., Shib) + ABAC credentials D. Discovery/Directory of resources/services Dissemination: non-essential, cannot subvert system  replaceable and “easy” to build scalable implementations GEC-12

More on what this is about These slides focus on the “Credentialing” functions. – Endorsing services and aggregates (trust structure) – Endorsing users (researcher-experimenters) – Endorsing projects and project leaders (see below) – Endorsing slices and linking them to projects – Naming …and establishing authorization policies. – Capability-based sharing (SFA) and flexible user control – Ownership by registered projects and users – Kill switch These topics are the keys to federation architecture. – Stitching boils down to naming and authorization.

PKI? We can build an architecture around this trust model using either: 1.SSL communication with an always-on server for each delegating principal; 2.signed assertions with asymmetric crypto (PKI); 3.all of the above. Each choice involves some painful tradeoffs. We revisit these tradeoffs later…. CA

PKI! Choice: use PKI, but use it wisely. – Abandon CA hierarchy: use a “trust forest” with multiple roots and flexible delegation. – Use attributes for authorization (trust), and bind them to bare public keys. Conventional PKI binds global names to keys: trust is a different problem, for which global naming is neither necessary nor sufficient. – Use automated inference to derive authority from signed assertions and policy rules. – See SPKI/SDSI [RFC 2693] CA

Certificates and credentials Each principal has at least one keypair that it may use to issue signed assertions. – Assertions represent delegations, policies, name bindings. Any such signed assertion is a certificate or “cert”. – Certificates reference other principals by their public keys. – A credential is a certificate used for authorization. Given knowledge of a public key, it is easy to secure communication with the principal who is using that keypair (authentication). We focus instead on authorization or trust management: how authenticated principals use credentials to establish trust. Certificate Term of validity Issuer’s name (or key) Signature Payload: assertion