www.geogrid.org 1 introduction of grid security yoshio tanaka aist, japan

21
www.geogrid.org 1 Introduction of Grid Security Introduction of Grid Security Yoshio Tanaka AIST, Japan

Upload: john-coughlin

Post on 27-Mar-2015

226 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

1

Introduction of Grid SecurityIntroduction of Grid Security

Yoshio TanakaAIST, Japan

Page 2: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

2

Again, what is Grid?Again, what is Grid?

Resource sharing & coordinated problem solving in dynamic, multi-institutional virtual organizations

Communities committed to common goalsAssemble team with heterogeneous members & capabilitiesDistribute across geography and organization

This slide is by courtesy of Ian Foster @ ANL

Page 3: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

3

Key Technologies: GSI and VOMSKey Technologies: GSI and VOMS

Grid Security Infrastructure (GSI) is standard security technology used in the current Grid communities.

Based on Public Key Infrastructure (PKI) and X.509 Certificates.

Virtual Organization Membership Services (VOMS) is a software for creating/managing VOs.

Developed by European CommunitiesBased on GSI

Page 4: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

4

GSI: Grid Security InfrastructureGSI: Grid Security Infrastructure

Authentication and authorization using standard protocols and their extensions.

Authentication: Identify the entityAuthorization: Establishing rights

StandardsPKI, X.509, SSL,…

Extensions: Single sign on and delegationEntering pass phrase is required only onceImplemented by proxy certificates

Page 5: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

5

PKI and X.509 certificatePKI and X.509 certificatePublic Key Infrastructure ( a pair of asymmetric keys )

Private key is used for data encryptionPublic key is used for data decryption

Every entity (users, computers, etc.) is required to obtain his/its certificate issued by a trusted Certificate Authority (CA)X.509 certificates contain

Name of SubjectPublic key of SubjectName of Certificate Authority (CA) which has signed it, to match key and identityDigital Signature of the signing CA

CertificateSubject DNPublic KeyIssuer (CA)Digital Signature

Page 6: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

6

How a user is authenticated by a serverHow a user is authenticated by a server

User Cert.Subject DNPublic KeyIssuer (CA)Digital Signature

serveruser

User Cert.Subject DNPublic KeyIssuer (CA)Digital Signature

Send Cert.

challenge string

encryptedchallenge string

QAZWSXEDC…

Public Keyof the CA

QAZWSXEDC…

QAZWSXEDC…Public Key

private key(encrypted)

PL<OKNIJBN…

Page 7: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

7

user

Communication*

Remote fileaccess requests*

remote processcreation requests*

Requirements for Grid securityRequirements for Grid security

server A server B

* with mutual authentication

SingleSign on

Delegation

Page 8: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

8

PKI and X.509 certificate (cont’d)PKI and X.509 certificate (cont’d)X.509 certificates

Similar to a driving license. Photo on the license corresponds to a public key.issued by a CAValidity of the certificate depends on the opposite entity’s policy

User CertificateSubject DNPublic KeyIssuer (CA)Digital Signature

Valid until Dec. 31, 2003

NAME: Taro Sanso

Address: 1-1-1, Umezono, Tsukuba

Identify the entity

Issued by a state/prefectureIssued by a CA

private key(encrypted)

Page 9: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

9

X.509 Proxy CertificateX.509 Proxy Certificate

Defines how a short term, restricted credential can be created from a normal, long-term X.509 credential

A “proxy certificate” is a special type of X.509 certificate that is signed by the normal end entity cert, or by another proxySupports single sign-on & delegation through “impersonation”

Page 10: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

10

User ProxiesUser Proxies

Minimize exposure of user’s private keyA temporary, X.509 proxy credential for use by our computations

We call this a user proxy certificateAllows process to act on behalf of userUser-signed user proxy cert stored in local fileCreated via “grid-proxy-init” command

Proxy’s private key is not encryptedRely on file system security, proxy certificate file must be readable only by the owner

Page 11: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

11

User Proxies (cont’d)User Proxies (cont’d)

User CertificateSubject DNPublic KeyIssuer (CA)Digital Signature

grid-proxy-init

Proxy CertificateSubject DN/Proxy(new) public key(new) private key (not encrypted)Issuer (user)Digital Signature (user)

sign

User CertificateSubject DNPublic KeyIssuer (CA)Digital Signature

Identity of the user

private key(encrypted)

Page 12: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

12

DelegationDelegation

Remote creation of a user proxyResults in a new private key and X.509 proxy certificate, signed by the original keyAllows remote process to act on behalf of the userAvoids sending passwords or private keys across the network

Client Server

Proxy-2private

Proxy-2public

Proxy-1Private

key

Proxy-1PublicKeyUser

Private Proxy-2public

Proxy-2Public

Proxy-1private

Proxy-1Private

UserPrivate

key

UserPublicKeyCA

Private

grid-proxy-init

Page 13: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

13

Traverse Certificate Chain to verify identityTraverse Certificate Chain to verify identityUser Identity

UserCertificateCA

User Identity

ProxyCertificate

User CertificateCA

User Identity

ProxyCertificate

User CertificateCA Proxy

Certificate

Page 14: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

14

Requirements for usersRequirements for users

Obtain a certificate issued by a trusted CAYou can launch your CA for testsThe certificate and the signing policy file of the CA should be put on an appropriate directory (/etc/grid-security/certificates).International Grid Trust Federation (IGTF) is a community for building trust.

Create a Proxy Certificate in advanceNeed to enter pass phrase for the decryption of a private key.

Only once!

A proxy certificate will be used for further authentication.

Page 15: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

15

Summary of GSISummary of GSI

Every entity has to obtain a certificate.Treat your private key carefully!!

Private key is stored only in well-guarded places, and only in encrypted form

Create a user proxy in advanceRun grid-proxy-init commandvirtual login to Grid environmentA proxy certificate will be generated on user’s machine.

Single sign on and delegation enable easy and secure access to remote resources.

Page 16: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

16

GSI provides basic technology for authentication (who is the user).

The other framework is necessary for authorization (what the user can do).

The most naive approach is to map each user to each local account on each server.

What happens if there are thousands to millions of users?

WhatWhat’’s the role of VOMS?s the role of VOMS?

“/C=JP/O=AIST/O=GRID/CN=Yoshio Tanaka” yoshio“/C=JP/O=AIST/O=GRID/CN=Ryosuke Nakamura” ryosuke…..

Page 17: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

17

WhatWhat’’s the role of VOMS? (conts the role of VOMS? (cont’’d)d)

VOMS provides a mechanism for VO-based authorization.

Users are registered to VO(s)Users can belong to Group(s) in the VOUsers can be assigned role(s)Service providers can configure the system to control access based on

VO-baseAll users in a VO can access to the service

Group-baseUsers in a specific group can access to the services

Group&Role-baseUsers in a specific group with specific role can access to the services

It is implemented by embedding “VOMS attributes” in user’s proxy certificate.

Page 18: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

18

Introduction of Grid and its technologyIntroduction of Grid and its technology

Yoshio TanakaNational Institute of Advanced Industrial Science and Technology

(AIST), Japan

Page 19: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

19

What is the GEO Grid ?What is the GEO Grid ?The GEO (Global Earth Observation) Grid is aiming at providing an E-Science Infrastructure for worldwide Earth Sciences communities to accelerate GEO sciences based on the concept that relevant data and computation are virtually integrated with a certain access control and ease-of-use interface those are enabled by a set of Grid and Web service technologies.

Geo* Contents Applications

Satellite DataSatellite Data

MapMapGeologyGeology

GIS dataGIS data

Field dataField data

EnvironmentEnvironment

ResourcesResources

GridTechnologies

GridTechnologies

Disastermitigation

Disastermitigation

AIST: OGF Gold sponsor (a founding member)

AIST: OGC Associate member (since 2007)

Page 20: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

20

Overview and usage model of the GEO Grid Overview and usage model of the GEO Grid systemsystem

User-level Authentication and VO-level AuthorizationUser’s right is managed (assigned) by an administrator of

his belonging VO.Access control to a service is configured by the service

provider according to the publication policy. There are some options of the access control

VO-level, Group/Role-based, User-level, etc.Scalable architecture for the number of users.

Page 21: Www.geogrid.org 1 Introduction of Grid Security Yoshio Tanaka AIST, Japan

     

    

www.geogrid.org

21

TDRS

Terra/ASTER

ERSDIS/NASA

APAN/TransPAC

GEO Grid Cluster

L0 L0 L0 L0L0 L0 L0 L0

L0 L0 L0 L0Data

GISserver

WFS WCS

Maps

mapserver

WMS

Meta data

catalogue/metadata

server

CSWOGSA

DAI GRAM GridFTP

gatewayserver

Storage(DEM)

portal server

GSI + VOMS GSI + VOMS

GSI + VOMS

AccountDB

account (GAMA)server

VO DB

VO (VOMS)server

user

login

credential

GET

queryexec