Presentation is loading. Please wait.

Presentation is loading. Please wait.

Assuring e-Trust always www.certiver.com 1 Status of the Validation and Authentication service for TACAR and Grids.

Similar presentations


Presentation on theme: "Assuring e-Trust always www.certiver.com 1 Status of the Validation and Authentication service for TACAR and Grids."— Presentation transcript:

1 Assuring e-Trust always www.certiver.com 1 Status of the Validation and Authentication service for TACAR and Grids.

2 Assuring e-Trust always www.certiver.com 2 Summary  OCSP Requirements for Grids  CertiVeR’s features –OCSP Client –OCSP Service  Future  Questions

3 Assuring e-Trust always www.certiver.com 3 OCSP Requirements for TACAR  Centralized OCSP service for all the hierarchies  Centralized root certificate management  The service should be able to sign the response for each CA with an authorized certificate (Authorized responder mode)

4 Assuring e-Trust always www.certiver.com 4 OCSP Validation for Grids  Grids special requirements for OCSP services: discoverable, fault tolerant, low latency, CA interoperability, etc.  GGF´s CAOPS-WG has been working in the document “OCSP Requirements for Grids”.  Such document provides information on: –OCSP Client Requirements, –OCSP Responder Requirements, –CA/Certificate Issuer Requirements and –OCSP Service Architecture.

5 Assuring e-Trust always www.certiver.com 5 Client current status

6 Assuring e-Trust always www.certiver.com 6 OCSP Client requirements for Grids A. Revocation source requirements: 1.Several sources (OCSP, CRL, AIA) and query order. B. Fault-tolerant requirements: 1.Multiple service invocation. 2.Caching of OCSP Responses. C. Security requirements: 1.Nonce usage. 2.OCSP Request signing. 3.Adoption of http and https. D. Error handling (i.e. Try Later, Respond with final status, etc.) E. OCSP Extension handling. F. “Unknown” status code handling for Proxy and Non-Proxy Certificates.

7 Assuring e-Trust always www.certiver.com 7 GridOCSP Client API - features  Open source code for Globus TK 4 about to be released.  Implements a XML-based OCSP Policy that supports:  The policy file used by our client allows for the definition of per- Issuer rules or a default behavior for each feature.  Each VO could place such file on a specific URI for all its clients A.1 Several revocation sourcesOCSP only, others 4Q 05 A.2 Adoption of http and httpsYes B.1 Multiple service invocationYes B.2 Caching of OCSP Responses4Q 05 C.1 Nonce usageYes C.2 OCSP Request signingYes D Error handlingYes E Extension handlingYes F User proxy certificate handlingYes

8 Assuring e-Trust always www.certiver.com 8 GridOCSP Client – policy definition e.g. (I)

9 Assuring e-Trust always www.certiver.com 9 GridOCSP Client – policy definition e.g. (II)

10 Assuring e-Trust always www.certiver.com 10 Server Current Status

11 Assuring e-Trust always www.certiver.com 11 OCSP Responder requirements for Grids A. Performance: 1.Scalability: To cover for growth in terms of Client requests. Revocation sources. 2.Use of cryptographic hardware. B. Flexibility: 1.Revocation source requirements. 2.Support different operation modes: 1.Transponder mode. 2.Trusted Responder mode. 3.Authorized Responder mode. 3.Coverage of proxy certificates revocation is a recommended feature. C. Reliability 1.Fault-tolerance is a recommended feature.

12 Assuring e-Trust always www.certiver.com 12 OCSP Service client scalability and reliability  Intrasite –Using balanced NAT  Extrasite –Using balanced DNS with very low persistence

13 Assuring e-Trust always www.certiver.com 13 OCSP Service – revocation source scalability OCSP Responder Cert Status Database CAs ∆CRL CA/RA CRL Updater LDAP CRLCRL Cert Status  CertiVeR v4 can set N Updater processes in order to push DeltaCRLs from the CAs

14 Assuring e-Trust always www.certiver.com 14 OCSP Service – Flexibility Courtesy of CAOPS-WG

15 Assuring e-Trust always www.certiver.com 15 New CertiVeR service available !  A new service - CertiVeR v4 - has been implemented covering the required features for Grids. Such service has just passed the Beta tests and it is available at: –http://globus-grid.certiver.comhttp://globus-grid.certiver.com –http://tacar.certiver.comhttp://tacar.certiver.com  Current features of the new service: A.1 ScalabilityLimited during pilot A.2 Use of cryptographic hardwareNot during pilot B.1 Revocation source requirementsYes B.2 Operation mode (Trusted, Authorized and Transponder) All except Transponder mode during pilot B.3 Coverage of proxy certificatesYes B.4 Extension handlingYes C.1 Fault-toleranceNot during pilot

16 Assuring e-Trust always www.certiver.com 16 The next steps...  Release of client open source code  Dissemination and Validation of the service –Provision of pilots for Grid and Tacar CAs  Technical improvements –Addition of servers in order to improve scalability and fault-tolerance –Use of cryptographic hardware –Setting up of Transponder connections –DeltaCRL push mechanism to be directly provided to each CA

17 Assuring e-Trust always www.certiver.com 17 For information about revocation services, try our demo at: http://www.certiver.com


Download ppt "Assuring e-Trust always www.certiver.com 1 Status of the Validation and Authentication service for TACAR and Grids."

Similar presentations


Ads by Google