WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

12
WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2 for Gridification Task: David Groep [email protected]

description

WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2. f or Gridification Task : David Groep hep-proj-grid-fabric -gridify @cern.ch. Fabric security components. External (“Grid”) components - PowerPoint PPT Presentation

Transcript of WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

Page 1: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

WP4 Gridification

Security Components in the Fabricoverview of the WP4 architecture as of

D4.2

for Gridification Task: David Groep

[email protected]

Page 2: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 2

Fabric security components

External (“Grid”) components issues relating to the three core Grid protocols (GRAM,

GSIFTP,GRIP) network issues (firewall admin, NAT) fabric authorization interoperability (multi-domain, AAA, co-

allocing)

Internal components authenticated installation services secure bootstrapping services

Page 3: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 3

WP4 Subsystems and relationships (D4.2)

Page 4: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 4

Job submission protocol & interface Current design

Client tools connect to gatekeeper GRAM (attributes over HTTPS) Gatekeeper does authentication,

authorization and user mapping RSL passed to JobManager

Identified design differences authorization and user mapping done

too early in process Identical components

Protocol must stay the same (GRAM) Separation of JobManager (closer to

RMS) and GateKeeper will remain Issues: scalability problems with many jobs within one centre (N

jobmanagers)authorization cannot take into account RMS state (budget, etc.)

Page 5: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 5

Authorization and AAA Current design:

Authorization and user mapping are combined (see next slide)

Local local site policy in authorization Identified design points

new component, taking concepts from generic AAA architectures

coordinate with AuthZ group and GGF Identical components

towards generic AAA architectures/servers(LCAS will be like an ASM)

distributed AAA decisions/brokering concepts from new

SciDAC/SecureGRID/AAAARCH workAccounting framework yet to be considered…

Page 6: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 6

Credential Mapping Current design:

Authorization and user mapping are combined

Gatekeeper map file with GridMapDir (on connection establishment)

Kerberos by external service (sslk5) Identified design points

move to later in the process (after the authorization decision)

Extend for multiple credential types…

Identical components gridmapdir patch by Andrew McNab sslk5/k5cert service

Issues in current design mapping may be expensive

(updating password files, NIS, LDAP, etc.)

Page 7: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 7

Local security service (FLIdS)

Non-critical for grid servicesneeded for intra-fabric security

Current design: Component is not Gridcomponent→not

there Technology ubiquitous (X.509 PKI)

Identified design points Policy driven automatic service policy language design (based on

generic policy language or ACLs) Identical components

PKI X.509 technology (OpenSSL) use by GSI and HTTPS

Issues: mainly useful in untrusted environments

(e.g., outside a locked computer centre) prevents CA overloading…

Page 8: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 8

Information Services (GriFIS) Current design:

MDS2.1: LDAP protocol with back-endsor F-Tree

Modular information providers Identical components

NO fundamental changes by WP4 GIS/Ftree and/or GMA/R-GMA or … Just More information providers Correlators between RMS, Monitoring

and CDB (internal WP4 components) Issues design

How will global scheduling decisions be made (AAA-wise)?

distributed AAA based on new standard

future for LCAS

Page 9: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 9

Network access to large fabrics Current Globus design

Is not in scope of Globus toolkit Identified issues

Needed component for large farms Needed for bandwidth provisioning,

brokerage & selective firewall adminning

Farm nodes not visible from outside! Identical components

0st order: no functionality 1st order: IP Masquerading routers 2nd order: IP Masq & protocol

translation (IPv6 → IPv4 and v.v.)

later: use of intelligent edge devices, managed bandwidth (and connections) per job, AAA interaction (with LCAS)

Page 10: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 10

Intra-fabric security issues

How to install a node in an untrusted network environment distribution of sensitive config data (SSH host keys) integrity of configuration data bootstrapping problem!

Secure install scenario requires a local quasi-CA(FLIdS = Fabric-Local Identity Service)

See use-case on next slide (don’t be terrified by the arrows…)

Page 11: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 11

Bootstrapping a machine on a hostile net

New host to be installed

CFG Configuration Database

Secured http server

LCA root cert

Operator install disk:-kernel and init-CFG https agent-Signed cert of operator-Protected private key of operator-LCA root certificate

CFG data ACLs

LCA cert and privkey

FLIDS engine

Automated CA,Will sign when requestApproved by `operator’

1:Operator boots system

2:agent makes https requestusing operator credentials

3:https server checks CFG data ACL(operator has all rights), can verify IDof operator using LCA root cert

4: sens config data encryptedusing session key

5: host generates key pair(but without a passphrase to protecting private part)

6: request sent to FLIDS engine,signed by operator key (in cleartext)(FLIDS hostname known from CFG data)

7: FLIDS checks signature of operator, and signsrequest with LCA key. Request DN namespace limited.

8: signed host cert back to host (in clear)9: host checks signature on cert using the LCA root cert on the boot disk

10: h

ttps

requ

ests

to C

FGau

then

ticat

ed w

ith n

ewsi

gned

hos

t cer

tific

ate

11: CFG web server can checkhostname in cert againstrequesting IP addressand check ACLs

Page 12: WP4 Gridification Security Components in the Fabric overview of the WP4 architecture as of D4.2

David Groep – WP4 gridification security components and D4.2 – 2002.03.04 - 12

Component Summary LCAS

comprehensive local authorization taking RMS issues into account accepted jobs WILL run should evolve into an “ASM” to allow inter-domain co-allocation

LCMAPS take as much as possible from existing gridmapdir work, generalize for K5

FabNAT 1st goal: solve addressing issue; later: managed firewalls etc; allow plug-in to LCAS

FLIdS build secure fabrics on an insecure network (smaller uni’s etc.), prevent CA

overload Key is to stay compatible and interoperable!

GRAM protocol (& RSL) [Globus, GGF] Information framework (GRIP, GMA, R-GMA, …) [Globus, GGF and EDG WP3] All work on security in AAAARCH, PKIX, GGF sec. area, SecureGRID