X-Road is a platform independent data exchange layer between different databases and information systems.

Similar documents
ReadyNAS Remote White Paper. NETGEAR May 2010

Introduction to the EIS Guide

Chapter 8 Monitoring and Logging

CAC/PIV PKI Solution Installation Survey & Checklist

Device Log Export ENGLISH

CS 356 Lecture 28 Internet Authentication. Spring 2013

SSL VPN Technology White Paper

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Setup Guide Access Manager Appliance 3.2 SP3

Test Case 3 Active Directory Integration

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

How to Make the Client IP Address Available to the Back-end Server

Cisco Expressway Basic Configuration

NETASQ ACTIVE DIRECTORY INTEGRATION

A Signing Proxy for Web Services Security. Dr. Ingo Melzer RIC/ED

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

Cross-channel protection GSelector s exclusive cross-station protection prevents the same song from playing at the same time across your stations.

[SMO-SFO-ICO-PE-046-GU-

Computer Networks. Secure Systems

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

NETASQ MIGRATING FROM V8 TO V9

ACE Management Server Deployment Guide VMware ACE 2.0

Authentication and Single Sign On

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Securing Web Services From Encryption to a Web Service Security Infrastructure

Security Policy Revision Date: 23 April 2009

WINGS WEB SERVICE MODULE

21.4 Network Address Translation (NAT) NAT concept

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Setup Guide Access Manager 3.2 SP3

OPC UA vs OPC Classic

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

BlackBerry Enterprise Service 10. Version: Configuration Guide

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

U06 IT Infrastructure Policy

Set up Outlook for your new student e mail with IMAP/POP3 settings

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Jobs Guide Identity Manager February 10, 2012

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

X-Road. egovernment interoperability framework

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

GS1 Trade Sync Connectivity guide

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Traveling Setup Microsoft Office

A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

CTS2134 Introduction to Networking. Module Network Security

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bit Chat: A Peer-to-Peer Instant Messenger

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Configuring Security Features of Session Recording

CareGiver Remote Support Information Technology FAQ

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Traveling Setup Outlook Express

Deploying F5 to Replace Microsoft TMG or ISA Server

ilinc Web Conferencing

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 17. Transport-Level Security

Synthetic Application Monitoring

Authentication in WLAN

Ciphermail Gateway Separate Front-end and Back-end Configuration Guide

IFS CLOUD UPLINK INSTALLATION GUIDE

Smart Card Authentication. Administrator's Guide

Active Management Services

BorderWare Firewall Server 7.1. Release Notes

Network Defense Tools

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide


Chapter 6 Virtual Private Networking Using SSL Connections

NEFSIS DEDICATED SERVER

Iowa Immunization Registry Information System (IRIS) Web Services Data Exchange Setup. Version 1.1 Last Updated: April 14, 2014

Secure Web Access Solution

Installing and configuring Microsoft Reporting Services

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Deployment Guide Microsoft IIS 7.0

Wharf T&T Cloud Backup Service User & Installation Guide

Agenda. How to configure

Fig : Packet Filtering

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N REV A01 January 14, 2011

Monitoring Traffic manager

Nokia E90 Communicator Using WLAN

Corporate Access File Transfer Service Description Version /05/2015

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

VMware Identity Manager Connector Installation and Configuration

ADFS Integration Guidelines

How to Implement Two-Way SSL Authentication in a Web Service

Deploying F5 with Microsoft Active Directory Federation Services

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

PUBLIC Connecting a Customer System to SAP HCI

Content Filtering Client Policy & Reporting Administrator s Guide

By default, pilight uses a random port for its socket server. Use the port setting If you want to set this to a fixed port.

Transcription:

What is? is a platform independent data exchange layer between different databases and information systems. Platform independence is achieved by using standardised SOAP protocol.

Services services are Web Services. Each service provider has a WSDL schema which describes all of it's services. * The term Web Service describes a standardized way of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol backbone.

Service consumer Service consumer is an institution or organization that uses services provided by service providers. Consumer certificate does not allow providing services.

Service provider Service provider is a database that is providing predefined web services through x-road infrastructure. Service provider certificate does not allow to use services of other service providers.

Central (PKI directory service) Central provides information about x-road public keys and ip addresses. Central has following services: DNS-SEC resolving providers ip addresses and publishing x-road consumers/producers public keys. NTP-SERVER keeping security s time up to date. HashRepository service storing all log hashes sent by security s.

Certification authority CA CA is an offline computer. It's issuing certificates to x-road consumers and producers. Information about producers IP addresses is also combined by CA. Public keys and IP aadresses are exported to central using offline media (USB flash drive).

is dedicated proxy for exchanging data between service consumers and providers. 's assignment is to: forward querys to a right producer check if consumer's/producer's certificate is valid encrypt/decrypt data check if consumer has permission to access services log all query's

Monitoring station Monitoring stations provide x-road s (security and central s) status information to system administrators. Monitoring Station is also collecting service usage information. Usage information contains only META-DATA (query time, user ID, user organization ID, database name and service name).

Adapter (process) Adapter is a webservice provider which modifies x-road queries to a database platform specific format.

X-road requirements 1 CPU - 64bit architecture is prefered (MISP is running only on 64bit) 512MB ram you can use less, but you will regret it Ubuntu Server 10.04 LTS One static IP address or more

Firewall configuration Ports for incoming services: TCP 5555 SSL data exchange between security s Ports for outgoing services: TCP 5555 SSL data exchange between security s TCP 25 SMTP, e-mailing (including error messages) TCP 37 UNIX time protocol for the diagnostics subsystem; TCP and UDP 53 Name services; TCP 80 HTTP, loading central keys; UDP 123 NTP, security clock synchronization; TCP 5555 SSL data exchange between security s TCP 5556 query hash logging protocol; UDP 6666 data exchange with monitoring stations.

20 Data consumers Information system Organization A : overview There are various databases and information systems in different platforms with need to co-operate Extra interface from every database to every information system would be expensive Databases Databa se Motor vehicle register Databa se Public services portal is a platform-independent secure standard interface between databases and information systems Business register Public Internet

21 Data consumers Information system Organization A : overview Database is adapted to by setting up Adapter Server, which contains: / SOAP Information systems implement: / SOAP client rules Databases Adapt er Motor vehicle register Adapt er Databa se Databa se Public services portal Business register Public Internet

22 : overview Databases Data consumers Information system Organization A Public services portal To secure the system, each party accesses via it s Server Server is a standard software solution that encrypts/decrypts outgoing/ingoing messages, filters ingoing messages as a firewall, and logs messages it receives Adapt er Motor vehicle register Adapt er Business register Databa se Databa se Public Internet

23 : overview Databases Data consumers Information system Organization A Traffic between Servers is encrypted with PKI. Servers have to be certified by Certification Authority Certificates are available for verification from Central Servers. Central Servers are duplicated Adapt er Motor vehicle register Adapt er Business register Databa se Databa se Public services portal Public Internet Central s

25 infrastructure Information System / Portal Adapter Databa se Organization service consumer organization service provider organization Public service (citizens, private companies, ) Central s Public portals Monitoring Central organization CA ( certification authority)

26 message flow (1) of IS Service consumer IS Service Service consumer organization DB Adapter of DB Service producer (DB) organization Central Servers

4. As user chooses to call a method (usage of which is authorized by the Information System), a message with method call goes towards the Server DB message flow (2) 5. In addition to the message body with data for method call, the message contains also a message header with user s Personal Code, the name of Information System, unique ID of the message etc. Adapter of DB Service producer (DB) organization 2. Whether user is identified by ID-card, password, face or something else is up to the Information System, provided that the way of identification is reliable Central Servers of IS 3. Information System 27 gives user access to methods user is authorized to use This is first level of authorization Service consumer IS Service consumer organization Service 1. User authenticates himself/herself. Information System must be able to get to know the proper Personal Code of user

28 11. Server of message flow (3) IS verifies over DNSSEC the certificate received from the Server of DB of IS 6. The Server signs the message with it s private key Service consumer IS Service 10. If certificate was valid, the Server of DB sends its certificate back to finish creation of secure connection 7. The Server of IS asks over DNSSEC the Central Server for IP address of the Server(s) of DB Service consumer organization DB Adapter of DB Service producer (DB) organization 9. Server of DB verifies over DNSSEC the certificate received from the Central Servers Server of IS 8. Server of IS opens TCP connection to the Server of DB and sends its certificate to start TLS security protocol

29 DB 15. Server message flow (4) 14. Server of DB checks whether the Information System is authorized for this method. This is the second level of authorization 16. Adapter Server commits the method call in the database Adapter of DB sends the decrypted message to the Adapter Server of IS Service consumer IS Service consumer organization Service 12. As secure channel has been created and other party verified, Server of IS sends signed message to Server of DB of DB Service producer (DB) organization 13. Server of DB verifies signature Central of the Servers message and logs the message

18. Server of producer sends signed response message to the Server of IS 19. Server of IS checks the signature of message flow (5) response message and logs the response message 21. Finally, user receives response he/she requested! of IS Service consumer IS Service consumer organization 30 Service DB Adapter 17. Server of producer signs the response message Service producer (DB) organization Server of DB Central Servers 20. Server of IS sends decrypted response message to the Information System

31 authorization levels If Database adapter does not trust Information System to grant individual permissions, it has possibility to hold additional permission matrix on the granularity of individual But this would be DB awful in case adapter of hundreds of Information Systems with thousands of! Server of DB Service producer (DB) organization Permission matrix on the granularity of Information Systems is held by the Server of the Database Central Servers Server of IS Consumer IS Service consumer organization Permission matrix on the Service granularity of individual is held by the Information System Information System is capable to grant permissions to its only on those methods that Information System itself is authorized to use by permission matrix held by the Server of DB

32 : Trusted logs (1) Server of DB logs messages coming from the Information Systems DB Adapter of DB Service producer (DB) organization Central Servers Consumer IS Service consumer organization Service Server of IS logs response messages coming from the Databases Both Servers hash their logs and send their hash chain periodically to the Central Servers

33 : Trusted logs (2) If an evil administrator of any Server would try to change the local log file, the hash in Server does not match the hash in Central Servers any more! Therefore, the logs cannot be broken With message given, it is always possible to check later the authenticity of the message whether such a message really existed or not. As trusted logs cannot be broken, the result of the check is trustworthy

34 WSDL: metaservices (1) listmethods Implemented by adapter Used by security Mandatory metaservice for every service provider Operation must return all provider s service (wsdl:operation) names in format: producername.servicename.versionnr example: population.listpersons.v1

35 WSDL: metaservices (2) testsystem Implemented by adapter Used by security Used for monitoring if adapter and database (and possibly all other needed s/services) are up and running.

36 WSDL: metaservices (3) listproducers: Implemented by consumer security Used by Information systems / portals Response contains the list of all available producers. Having list of all producers it is possible to receive the list of available methods with metaservice allowedmethods.

37 WSDL: metaservices (4) allowedmethods: Method dbname.allowedmethods is implemented by security of DB. Used by Information systems / portals. Service response contains the list of all allowed methods for caller organisation.