Cloud Computing. Lecture 5 Grid Security 2014-2015



Similar documents
Public Key Infrastructure in idrac

COSC4377. Chapter 8 roadmap

, ) I Transport Layer Security

GT 6.0 GSI C Security: Key Concepts

Technik und Informatik. SOAP Security. Prof. Dr. Eric Dubuis Berner Fachhochschule Biel. Version April 11, 2012

Safety 1st Mobile Security. Markus Kopf payleven

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Cryptography Basics. 1 Secret Key Encryption. 1.1 Classical Cryptosystems. Lecture Notes (Syracuse University) Cryptography Basics: 1

A quick overview of the DANE WG. * DNS-based Authentication of Named Entities

Managing Credentials with

Factory Application Certificates and Keys Products: SB700EX, SB70LC

Grid Delegation Protocol

Using the MyProxy Online Credential Repository

Configuring HTTPS support. Overview. Certificates

A STEP- BY-STEP GUIDE

CS 772. Network Security: Concepts, Protocols and Programming Fall 2008 Final Exam Time 2 & 1/2 hours Open Book & Notes.

CS 356 Lecture 28 Internet Authentication. Spring 2013

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Configuring SSL Termination

SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES

Ciphire Mail. Abstract

Encrypted Connections

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Netzwerksicherheit Übung 6 SSL/TLS, OpenSSL

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Gateway

GRID COMPUTING Techniques and Applications BARRY WILKINSON

Overview. SSL Cryptography Overview CHAPTER 1

Is Your SSL Website and Mobile App Really Secure?

Security. Learning Objectives. This module will help you...

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Enabling SSL and Client Certificates on the SAP J2EE Engine

GSI Credential Management with MyProxy

Globus Toolkit: Authentication and Credential Translation

Angel Dichev RIG, SAP Labs

Using BroadSAFE TM Technology 07/18/05

2 Transport-level and Message-level Security

Grid Security : Authentication and Authorization

SBClient SSL. Ehab AbuShmais

02267: Software Development of Web Services

IVOA Single Sign-On security

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Cloud Computing. Lecture 5 Grid Case Studies

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

CSE/EE 461 Lecture 23

Network Security Essentials Chapter 5

AD Image Encryption. Format Version 1.2

CRYPTOGRAPHY IN NETWORK SECURITY

Chapter 7 Transport-Level Security

Execution Management: Key Concepts

SSL Overview for Resellers

Chapter 10. Cloud Security Mechanisms

Configuring Secure Socket Layer (SSL)

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS

Solutions for Web Services Security

Internet Programming. Security

As enterprises conduct more and more

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

An Introduction to Cryptography as Applied to the Smart Grid

An Online Credential Repository for the Grid: MyProxy

Savitribai Phule Pune University

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4

SSL Protect your users, start with yourself

Chapter 17. Transport-Level Security

CICS Identity and Security

IGI Portal architecture and interaction with a CA- online

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

How To Encrypt Data With Encryption

Internet Mail Client Control Library SSL Supplement

Secure Frequently Asked Questions

Central Desktop Enterprise Edition (Security Pack)

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Using Globus Toolkit

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

CRYPTOGRAPHY AS A SERVICE

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Building a Secure RedHat Apache Server HOWTO

Security Policy Revision Date: 23 April 2009

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Mobile Admin Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Bit Chat: A Peer-to-Peer Instant Messenger

Authentication Applications

Authentication Applications

Quickstream Connectivity Options

Implementing Secure Sockets Layer on iseries

GSI with OpenSSL. Vincenzo Ciaschini. Prague, 4-7/11/08. EGEE and glite are registered trademarks. egee EGEE-II INFSO-RI

WIRELESS LAN SECURITY FUNDAMENTALS

Is your data safe out there? -A white Paper on Online Security

Displaying SSL Certificate and Key Pair Information

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Web Services. Web Service Security. Copyright 2010 Davide Cerri & Srdjan Komazec

Transcription:

Cloud Computing Lecture 5 Grid Security 2014-2015

Up until now Introduction. Definition of Cloud Computing. Grid Computing: Schedulers Globus Toolkit

Summary Grid Security TLS WS-Security Proxy certificates MyProxy Community Authorization Services

Grid Security: Context

Grid Security: Problems Valuable resources solving sensitive problems. Federation of organizations. Multiple security domains. Need for transparency. Both client-server and server-server interactions. Service composition. Variety of policies.

Ideal Solution! Single sign-on. Even if you re running a task that: Requires secure communication. Uses several services: Multiple authentication? On different organizations: Different identities? Different policies?

GT4 Tools Globus Toolkit Java Runtime GSI- OpenSSH MyProxy Data Rep C Runtime Delegation GRAM GridFTP Replica Location Python Runtime CAS GridWay Reliable File Transfer MDS4 Base Segurança Security Execution Execução Dados Data Monitoring Monit.

Let s recap some security concepts! Identity/Certification: Who is this person? Who is assuring that this identity matches a real person? Authentication: Is this person who she says she is? Authorization: Is this person allowed to do what she is requesting? Integrity: Has the message I m receiving been tampered with? Confidentiality: Will this message be exposed to anyone?

GSI: Globus Security Infrastructure It doesn t solve the trust issue but gets everyone using the same protocols and understanding each others certificates:

Secure Web Services <S:Envelope> <S:Header>... <Security S:actor="... S:mustUnderstand="...">... </Security>... </S:Header> <S:Body> </S:Body> </S:Envelope>

TLS: Transport Layer Security Transport level encryption protocol. Steps: 1. Algorithm negotiation. 2. Key exchange. 3. Symmetric encryption. Supported Algorithms: Key exchange: RSA, Diffie-Hellman, ECDH, SRP, PSK. Authentication: RSA, DSA, ECDSA. Symmetric key: RC4, Triple DES, AES, IDEA, DES. Hashing: HMAC-MD5, HMAC-SHA.

TLS: Communication Encryption

Identity: X.509 Certificates Certificate: Data: Version: 1 (0x0) Serial Number: 7829 (0x1e95) Signature Algorithm: md5withrsaencryption Issuer: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/emailAddress=server-certs@thawte.com Validity Not Before: Jul 9 16:04:02 1998 GMT Not After : Jul 9 16:04:02 1999 GMT Subject: C=US, ST=Maryland, L=Pasadena, O=Brent Baccala, OU=FreeSoft, CN=www.freesoft.org/emailAddress=baccala@freesoft.org Subject Public Key Info: Public Key Algorithm: rsaencryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:b4:31:98:0a:c4:bc:62:c1:88:aa:dc:b0:c8:bb: 33:35:19:d5:0c:64:b9:3d:41:b2:96:fc:f3:31:e1: 66:36:d0:8e:56:12:44:ba:75:eb:e8:1c:9c:5b:66: 70:33:52:14:c9:ec:4f:91:51:70:39:de:53:85:17: 16:94:6e:ee:f4:d5:6f:d5:ca:b3:47:5e:1b:0c:7b: c5:cc:2b:6b:c1:90:c3:16:31:0d:bf:7a:c7:47:77: 8f:a0:21:c7:4c:d0:16:65:00:c1:0f:d7:b8:80:e3: d2:75:6b:c1:ea:9e:5c:5c:ea:7d:c1:a1:10:bc:b8: e8:35:1c:9e:27:52:7e:41:8f Exponent: 65537 (0x10001) Signature Algorithm: md5withrsaencryption 93:5f:8f:5f:c5:af:bf:0a:ab:a5:6d:fb:24:5f:b6:59:5d:9d: 92:2e:4a:1b:8b:ac:7d:99:17:5d:cd:19:f6:ad:ef:63:2f:92: ab:2f:4b:cf:0a:13:90:ee:2c:0e:43:03:be:f6:ea:8e:9c:67: d0:a2:40:03:f7:ef:6a:15:09:79:a9:46:ed:b7:16:1b:41:72: 0d:19:aa:ad:dd:9a:df:ab:97:50:65:f5:5e:85:a6:ef:19:d1: 5a:de:9d:ea:63:cd:cb:cc:6d:5d:01:85:b5:6d:c8:f3:d9:f7: 8f:0e:fc:ba:1f:34:e9:96:6e:6c:cf:f2:ef:9b:bf:de:b5:22: 68:9f Most common certificate format: Contains: Person s identification. Identification of a certification authority (CA). Person s public key. CA digital signature. Requires trusting the CA and knowledge of it s public key. Dominant mechanism in the grid community.

WS-Security Ensures integrity, authentication and confidentiality. Digital signature and encryption key specification using WS. Works at application level. Specifies the SOAP message headers and the variants of the different fields.

UsernameToken Example <wsse:security> <wsse:usernametoken> <wsse:username>zoe </wsse:username> <wsse:password>ilovedogs </wsse:password> </wsse:usernametoken> </wsse:security>

BinarySecurityToken Example <wsse:binarysecuritytoken xmlns:wsse="http://schemas.xmlsoap.org/ws/2002/ 04/secext" Id="myToken" ValueType="wsse:X509v3" EncodingType="wsse:Base64Binary"> MIIEZzCCA9CgAwIBAgIQEmtJZc0... </wsse:binarysecuritytoken>

Delegation What if a service needs to call another one? We need Delegation!! Solves the multiple login problem. User signed proxies. Private key not encrypted in the local file system. Time-limited (12h). When you log out, the stored proxies are not eliminated.

Single Sign-on and Delegation To authenticate with your certificate directly you would have to type a passphrase every time. Also you need a way to send your credentials across. In the Grid Security Infrastructure today, this is solved by proxy certificates : a temporary key pair. in a temporary certificate signed by your long term private key. valid for a limited time (default: 12 hours). and itself not protected by a passphrase.

Proxy Certificate Generation B needs A's credentials to make a request to C. B, therefore, needs a proxy certificate signed by A: B generates a public/private key pair for the proxy certificate. B uses the key pair to generate a certificate request, which will be sent to A using a secure channel. This certificate request includes the proxy's public key, but not the private key. Organization A will use its private key to digitally sign the certificate request. A sends the signed certificate back to B using a secure channel. B can now use the proxy certificate to act on A's behalf. Note: proxy's private key and A s private key are never transmitted between A and B.

Proxy Initiation in Globus User enters pass phrase, which is used to decrypt private key. Private key is used to sign a proxy certificate with its own, new public/private key pair: User s private key not exposed after proxy has been signed. Pass Phrase User certificate file Private Key (Encrypted) User Proxy certificate file Proxy placed in /tmp the private key of the Proxy is not encrypted: stored in local file: must be readable only by the owner; proxy lifetime is short (typically 12 h) to minimize security risks

MyProxy What if I m executing a long-running task? What if my grid (not very well integrated) requires several certificates. MyProxy: Stores long-lasting certificates (private keys are encrypted). Generates short term certificates from the login (unencrypted private keys). Interacts with certification authorities to acquire certificates.

MyProxy Put Client certificate private key TLS handshake username proxy password certificate request chain policy MyProxy Server keypair cert chain private key

MyProxy Get Client cert chain private key TLS handshake username proxy password certificate request chain MyProxy Server X.509 Grid Service cert chain private key

Password-based Renewal Client job proxy password password proxy Condor-G proxy password proxy proxy job GRAM Gatekeeper proxy Job proxy MyProxy proxy

Authorization and Trust in VOs: Community Authorization Service WS require authorization. There are several interface mechanisms between X.509 and policy repositories. What if we want to integrate the repository in the grid s virtual organizations? CAS is a centralized repository that relates agents, resources and actions.

CAS Administration Services Enrolling and Unenrolling Objects Enrolling and Unenrolling Service Type Maintaining Service Types Maintaining User Groups Maintaining Object Groups Maintaining Permissions

A Typical CAS Request User proxy Community proxy Proxy restrictions CAS Server What rights does the community grant to this user? CAS-maintained community policy database Client Resource Server Community proxy Proxy restrictions Is this request authorized for the community? Local policy information Do the proxy restrictions authorize this request?

Signed Authorization Assertions Subject: /O=Grid/CN=Laura Valid: 3/25/03 11:00 3/26/03 11:00 AuthorizationAssertion (non-critical extension): Target Subject: /O=Grid/CN=Laura Valid: 3/25/03 13:00 15:00 These actions are allowed: Read gridftp://myhost/mydir/* Signature (of assertion, by the VO CAS server) Signature (of all above, by the user) The authorization assertion is signed by the VO s CAS server. It delegates a subset of the VO s rights to a user, during a validity time. It is only valid when used along with the target user s authentication credentials.

Grid Case Studies Next time