LHCONE Point-to-Point Circuit Experiment Authentication and Authorization Model Discussion LHCONE meeting, Rome April 28-29, 2014 W. Johnston, Senior Scientist.

Slides:



Advertisements
Similar presentations
© 2006 Open Grid Forum Network Services Interface Introduction to NSI Guy Roberts.
Advertisements

NSI wg Architecture Elements John Vollbrecht Internet2.
PKI Trust Root Concepts ACP Working Group – I April 2009.
Lawrence Berkeley National LaboratoryU.S. Department of Energy | Office of Science Network Service Interface (NSI) Inder Monga Co-chair, Network Services.
© 2006 Open Grid Forum Network Service Interface in a Nut Shell GEC 19, Atlanta, GA Presenter: Chin Guok (ESnet) Contributors: Tomohiro Kudoh (AIST), John.
NORDUnet Nordic infrastructure for Research & Education LHCONE “Point-to-Point Connection Service” Service Definition Jerry Sobieski.
High Performance Computing Course Notes Grid Computing.
SA2 “Testbeds as a Service” LHCONE Meeting May 2/ Geneva, CH Jerry Sobieski (NORDUnet)
1 Chin Guok ESnet Network Engineer David Robertson DSD Computer Software Engineer Lawrence Berkeley National Laboratory.
Computing and Data Infrastructure for Large-Scale Science Deploying Production Grids: NASA’s IPG and DOE’s Science Grid William E. Johnston
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
LHCONE Point2Point Service ‘BGP solution’ From the Netherlands: Freek Dijkstra, Sander Boele, Hans Trompert and Gerben van Malenstein LHCOPN - LHCONE meeting.
Draft-li-rtgwg-cc-igp-arch-00IETF 88 RTGWG1 An Architecture of Central Controlled Interior Gateway Protocol (IGP) draft-li-rtgwg-cc-igp-arch-00 Zhenbin.
ESnet On-demand Secure Circuits and Advance Reservation System (OSCARS) Chin Guok Network Engineering Group Thomas Ndousse Visit February Energy.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
USCGrid A (Very Quick) Introduction To Authn/Authz
LHCOPN & LHCONE Network View Joe Metzger Network Engineering, ESnet LHC Workshop CERN February 10th, 2014.
National Science Foundation Arlington, Virginia January 7-8, 2013 Tom Lehman University of Maryland Mid-Atlantic Crossroads.
TeraPaths TeraPaths: establishing end-to-end QoS paths - the user perspective Presented by Presented by Dimitrios Katramatos, BNL Dimitrios Katramatos,
Performance Monitoring - Internet2 Member Meeting -- Nicolas Simar Performance Monitoring Internet2 Member Meeting, Indianapolis.
Sponsored by the National Science Foundation Programmable Networks and GENI Marshall Brinn, GPO GEC October 25, 2012.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
InterDomain Dynamic Circuit Network Demo Joint Techs - Hawaii Jan 2008 John Vollbrecht, Internet2
A Framework for Internetworking Heterogeneous High-Performance Networks via GMPLS and Web Services Xi Yang, Tom Lehman Information Sciences Institute (ISI)
Bandwidth-on-Demand evolution Gerben van Malenstein Fall 2011 Internet2 Member Meeting Raleigh, North Carolina, USA – October 3, 2011.
Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008
TeraPaths TeraPaths: Establishing End-to-End QoS Paths through L2 and L3 WAN Connections Presented by Presented by Dimitrios Katramatos, BNL Dimitrios.
Connect. Communicate. Collaborate BANDWIDTH-ON-DEMAND SYSTEM CASE-STUDY BASED ON GN2 PROJECT EXPERIENCES Radosław Krzywania (speaker) PSNC Mauro Campanella.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Building Dynamic Lightpaths in GÉANT Tangui Coulouarn, DeIC E-Infrastructure Autumn Workshop, Chiinău 8 September 2014.
1 IETF 72 SIP WG meeting SIP Identity issues John Elwell et alia.
LHC OPEN NETWORK ENVIRONMENT STATUS UPDATE Artur Barczyk/Caltech Tokyo, May 2013 May 14, 2013
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
NORDUnet Nordic Infrastructure for Research & Education Workshop Introduction - Finding the Match Lars Fischer LHCONE Workshop CERN, December 2012.
LHC Open Network Environment Architecture Overview and Status Artur Barczyk/Caltech LHCONE meeting Amsterdam, September 26 th,
Connect communicate collaborate LHCONE moving forward Roberto Sabatino, Mian Usman DANTE LHCONE technical workshop SARA, 1-2 December 2011.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
January 16 GGF14 NMWG Chicago (June 05) Jeff Boote – Internet2 Eric Boyd - Internet2.
Dynamic Circuit Network An Introduction John Vollbrecht, Internet2 May 26, 2008.
Introduction to Active Directory
Point-to-point Architecture topics for discussion Remote I/O as a data access scenario Remote I/O is a scenario that, for the first time, puts the WAN.
Dynamic Network Services In Internet2 John Vollbrecht /Dec. 4, 2006 Fall Members Meeting.
DICE: Authorizing Dynamic Networks for VOs Jeff W. Boote Senior Network Software Engineer, Internet2 Cándido Rodríguez Montes RedIRIS TNC2009 Malaga, Spain.
NSI Aggregator: Joint SURFnet/ESnet effort LHCONE Workshop CERN (Geneva, CH) Feb 10-11, 2014 NSI PCE Development Team.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Strawman LHCONE Point to Point Experiment Plan LHCONE meeting Paris, June 17-18, 2013.
IDCP and NSI: Lessons Learned, Deployments and Gap Analysis Chin Guok, Inder Monga OGF 34 Oxford, UK.
LHCONE NETWORK SERVICES: GETTING SDN TO DEV-OPS IN ATLAS Shawn McKee/Univ. of Michigan LHCONE/LHCOPN Meeting, Taipei, Taiwan March 14th, 2016 March 14,
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
ESnet’s Use of OpenFlow To Facilitate Science Data Mobility Chin Guok Inder Monga, and Eric Pouyoul OGF 36 OpenFlow Workshop Chicago, Il Oct 8, 2012.
Policy in GÉANT Guy Roberts, Tangui Coulouarn NSI meeting, NORDUnet Conference, Uppsala, 22 Sept 2014.
100GE Upgrades at FNAL Phil DeMar; Andrey Bobyshev CHEP 2015 April 14, 2015.
LHCONE NETWORK SERVICES INTERFACE (NSI) POINT-TO-POINT TESTBED WITH ATLAS SITES Shawn McKee/Univ. of Michigan Kaushik De/Univ. of Texas Arlington (Thanks.
Topology Issues in Inter-Domain Connection Services Jerry Sobieski (NORDUnet) The Cynic’s Perspective & Jeroen van der Ham (University of Amsterdam) The.
Lawrence Berkeley National LaboratoryU.S. Department of Energy | Office of Science Network Service Interface: Concepts and Architecture Inder Monga Guy.
Dynamic Network Services In Internet2
InterDomain Dynamic Circuit Network Demo
NSI Topology Thoughts on how topology fits into the NSI architecture
NSI wg Architecture Elements
Establishing End-to-End Guaranteed Bandwidth Network Paths Across Multiple Administrative Domains The DOE-funded TeraPaths project at Brookhaven National.
NSI Service Definition
Network Services Interface
Integration of Network Services Interface version 2 with the JUNOS Space SDK
Network Services Interface
Chapter 10 – Software Testing
Interdomain Dynamic Circuits
Interoperable Measurement Frameworks: Internet2 E2E piPEs and NLANR Advisor Eric L. Boyd Internet2 17 April 2019.
Presentation transcript:

LHCONE Point-to-Point Circuit Experiment Authentication and Authorization Model Discussion LHCONE meeting, Rome April 28-29, 2014 W. Johnston, Senior Scientist and Advisor ESnet and Lawrence Berkeley National Laboratory Berkeley, California, U.S.A

2 AuthN/AuthZ simplicity is essential Very important to keep the authentication (AuthN) and authorization (AuthZ) as simple as possible during the experiment phase: NSI deployment and interopability testing – We need to focus initially on making sure that the Provider NSAs will work together and reliability setup nad operate multi-domain circuits On the other hand, it should not be ignored because somthting will have to be in place when end sites start using the service, even experimentally One way to keep AuthN as simple as possible is to have all those operations done in as small a trust sphere as possible A simple authorization environment will also help to keep authenticaion simple – For example: – Only have the requesting user authorized by the first domain encountered (e.g. the upstream NSP) – During circuit setup, the NSPs only authorize to each other (chain model)

3 AuthN/AuthZ simplicity is essential The IDCP only supported a chain model of multi-domain VC set up – AuthZ was essentially first-come, first-served basis – The NSPs had agreements among themselves about how much guaranteed b/w traffic that they are willing to carry and the end user identities were not relevant beyond the first domain – The users at each end could verify the identity of the other – the ultimate AuthZ was whether the user at the far end from the requestor was willing to allow the circuit to be built at the receiving site However, the chain model of set up across multiple domains is fragile and prone to stalling for reasons that cannot be determined by the requestor

4 Chain model of circuit setup and AuthN/AuthZ This is effectively how Authn/AuthZ was implemented in IDCP and is probably the simplist model as identity verification is kept mostly local UA User A login IA 0 User AuthN token generated UA user request NSA 1 request AuthZ 1 NSA 2 request AuthZ 2 NSA 3 request AuthZ 3 site request AuthZ 4 IA 1 IA 2 IA IA 0 User token 9 11 User B The “ultimate” AuthZ is essentially an out-of-band, bi-lateral agreement between UserA and UserB The inter-domain AuthZ was primarily a question of available capacity within the scope of agreement between domains

5 LHCONE P2P Issues and Required Functionality What are the issues with these models and what lessons can we draw for the LHCONE P2P service? The chain model is inherently slow and un-scalable with the current generation of software The tree model requires the user to have standing with all the intermediate domains, which will almost certainly never be the case The 3 rd party request model seems most likely to be successful – probably in a tree model configuration because – The connection setup requests to the intermediate domains can be handled in parallel – The user only has to have standing with a single entity (“M”) that could be a community service (M then has standing with all possible intermediate networks – “M” then is likely the NSA acting as an aggregation service All of these assume discovery and topology services are in place Several models have been proposed for constructing the inter-domain connection /3/ /3/ “GLIF Automated GOLE Pilot Project and NSI,” Sobieski. LHCONE Meeting, Jan 30/31, 2012, Berkeley, USA Chain model Tree model 3 rd party request

6 AuthN/AuthZ simplicity is essential The ability of the NSI Aggregrator to function in tree mode is designed to address the fragility of the chain model – The Aggregrator can see what is happening in the requested setup of each segment of the multi-domain path and when problems develop on one segment, can use its global path-finding ability to see if other routes are available – The concept of an “aggregrator” is the single functional improvement of NSI over IDCP – Use of the Aggregrator in tree mode is likely critical for the success of the LHCONE P2P environment, so a minimalist AuthN/AuthZ model that accommodates the Aggregrator must be developed E.g. have an LHC specialized Aggregrator act as the 3 rd party noted above so that the user does not have to authenticate or authorize with intermediate domains

7 Tree model of circuit setup This model concentrates all trust management with the Aggregrator and has several characteristics – The AG must be able to verify the idenitiy of everyone – The AG can effectively define a distinct user community (e.g. LHC) if the NSPs support multiple science communities That is, the AG can be “owned” by the LHC community This is a more complicated trust model than chain, but the tree management of VC setup is essential IA0IA0 UAuser request NSA 1 request AuthZ 1 NSA 2 AuthZ 2 NSA 3 request AuthZ 3 site AuthZ 4 IA0IA0 User info Ag NSA IA1IA1 IA2IA2 IA3IA3 request User info

8 Resource Management and AuthZ No model exists for fine-grained management of b/w resources – I commented on an Arch call that I would see how ESnet scheduled its 100G and OpenFlow testbeds – Brian Tierney said that they considered partial resource allocation, but decided it was not worth the effort: The testebds are scheduled as a whole unit