Overview of Security Standards in the Grid CSE 225 High Performance and Computational Grids Spring 2000 Prepared By kwalsh@ucsd.edu Objectives: • Gain familiarity with computer and network security standards. • Gain understanding of security requirements in Grid environments. • Gain understanding of some standards based security technologies present in Grid environments. • Learn about various Grid security models and system approaches to security. • Learn about some test bed implementations of security enabled Grid projects. Technology Standards Security Requirements Authentication Authorization Assurance Accounting Audit Integrity Confidentiality SSH PGP SSL X.509 PKI Kerberos DCE IPSec VPN From Grid U's policy perspective, what are the security requirements of Condor, Legion, Globus, and the commodity Internet? Sun Sun SD SD SD Sun Sun SPARCclassic SPARCclassic Sun SPARCcluster 1 Sun Sun microsystem Sun Sun Sun E10K Sun Sun SPARCclassic Sun Sun microsystem Sun E10K SPARCclassic Sun Sun SPARCclassic SPARCclassic Condor Flock U Legion U Virtual U Globus U UNIVERSITY UNIVERSITY UNIVERSITY vBns UNIVERSITY Calren 198.32.248.0 Abilene Commodity Internet UNIVERSITY Grid U Sun Sun Sun SPARCclassic Sun SPARCclassic SD SD Sun Sun SD Sun Sun SPARCclassic Sun SPARCclassic SPARCcluster 1 Sun microsystem Sun microsystem Sun Sun Sun E10K Sun SPARCclassic Sun SPARCclassic Sun E10K Security Domains • Intradomain - internal to a given location or single organization. Contained security boundary. • Interdomain - encompasses two or more locations or organizations. Agreed on security boundaries and protocols between organizations. Security - The Protection of Assets • Prevention: take measure that protect your assets from damage • Detection: take measures that allow you to detect when an asset has been damaged, and who caused the damage. • Reaction: take measures that allow you to recover your assets or recover from damage to your assets. Computer Security • Confidentiality: prevention of unauthorized disclosure of information. • Integrity: prevention of unauthorized withholding of information. • Availability: prevention of unauthorized withholding of information or resources. Network Security (1) • • • • • Trusted Networks Identification and Authentication Discretionary Access Control Labels and Mandatory Access Control Audit Technology - Cryptography • • • • • • DES (Data Encryption Standard) DSA (Digital Signature Algorithm) RSA (Rivest, Shamir, and Adelman) Blowfish IDEA (International Data Encryption Algorithm) AES (Advanced Encryption Standard) Technology - SSH (1) • SSH is a packet-based binary protocol that implements a transport layer security mechanism. • Encompasses authentication, key exchange, encryption, and integrity. • TCP/IP is used as the transport usually • Basically an end to end encrypted tunnel • SSH logins the most prevalent between domains. Technology - SSH (2) Technology - PGP • • • • Pretty Good Privacy Public Domain Popular for email and email of files PGP user builds key ring of all public keys he has been given. • When message of file received from contact, can decrypt if key is on key ring Shortcomings of PGP in distributed systems • Reasonable basis for key management among friends, but once it passes the bounds of direct friends, the credibility becomes strained. • Example – Carol’s key is P1 signed with P2 – Alice’s key is P2 signed with P4 – Carol’s key is P1 signed with P5 • What is the last certificate said Carol’s key is P3 signed with P5? Kerberos (1) • Supports authentication in distributed systems. • Used for authentication between intelligent processes, client to server tasks or workstation to other hosts. • Basis of Kerberos is central server that provides authenticated tokens, called tickets. Kerberos (2) Initiating Kerberos Session User U Ticket Granting Server Encrypted under password 1 U's Idenity Session Key Sg Ticket Tg 2 2 Kerberos Server Session Key Sg Encrytped Under KS-TGS Key Kerberos (3) Obtaining a ticket to access file 1 Request to access File F Ticket Granting Server User U 2 Ticket to File Server to Access File F +Sf Encrypted Under TGS-F Key + Sf Kerberos (4) Strengths • • • • • No password communicated on the network. Cryptographic protection against spoofing. Limited period of validity Time stamps to prevent replay attacks Mutual authentication Kerberos (5) Shortcomings in distributed systems • Requires continuous availability of a trusted ticket granting service. • Authenticity of servers requires a trusted relationship between the ticket granting server and every server. • Requires timely transactions. • Subverted workstation can save and later replay user passwords. • Does not scale well. Public Key Infrastructure (1) • PKI: consists of software and procedures put in place by an organization • Supports the use of Public Keys for authentication and identifying users, services, and confirming digital signatures. • Public keys usually conform to the X.509 standard for certificates, and usually are based on the RSA public/private key encryption algorithm Public Key Infrastructure (2) Goals • Application enabler • Secure Sign-On – Secure “Single” Sign Security • End-User Transparency • Comprehensive Security Public Key Infrastructure (3) Components and Services • • • • • • • • • • Certification Authority Certificate repository Certificate Revocation Key backup and recovery Automatic key update Key history management Cross-certification Support for non-repudiation Time stamping Client software Public Key Infrastructure (4) Current Standards Activities • • • • • • • X.509 PKIX X.500 LDAP S/MIME IPsec TLS Section Break • Security in Legion and Globus Security in Legion (1) Design Principals • 1- As in the Hippocratic Oath, do no harm! • 2- Caveat emptor - let the buyer beware. • 3- Small is beautiful. Security in Legion Standards • X.509 ? • Keberos ? Security in Legion Legion Security Model Security in Legion (2) Basic Concepts • Every object provides certain known member functions - MayI, CanI, Iam, and Delegate. (Can be defaulted to NIL.) • Two objects associated with each operation: a responsible agent (RA) and a calling agent (CA) • Every invocation of member function is performed in the context of a certificate which contains the Legion Object ID. Certificate digitally signed by maker Security in Legion Security in Legion • • • • • • Legion users responsible for own security. Object might trust that the CA is correct. Policies defined by objects themselves. Every class defines a special member function, MayI. MayI defines the security objects for a class. Every member function invocation permitted only if MayI sanctions it. Security in Legion Automatic invocation of outgoing calls Security in Legion • Authentication aided by use of Legion certificates based on public-key cryptography by default. Must know private key to authenticate. • MayI functions can code their own authentication protocols • Every Legion object required to supply special member function Iam for authentication purposes. Security in Legion • Login establishes user identity and creates responsibility agent for user. • Login is building block for authentication and delegation. • Object can delegate new certificate to delegate rights. • Delegation policy defined by object. Security in Legion Future Work • Legion does not specify any particular encryption. Future standardization? • Legion eschews distinguished trusted objects centralized key management server • Composition of a security policy Security in Globus (1) Standards • Standards subscribed to: – Generic Security Services (GSS) RFC 2078 – Secure Socket Layer (SSL) • [SSleay] – Public Key Cryptography based on X.509 certificates – Kerberos Security in Globus (2) Security in Globus (3) Security Requirements • • • • • • • Single sign-on Protection of credentials Interoperability with local security solutions Exportability Uniform credentials/certification infrastructure Support for secure group communication Support for multiple implementations Layered Architecture Applications High-level Services and Tools GlobusView DUROC Nexus Gloperf MPI MPI-IO CC++ Testbed Status Nimrod/G globusrun Core Services Metacomputing Directory Service Condor MPI LSF Easy NQE Globus Security Interface Local Services GRAM Heartbeat Monitor AIX GASS TCP UDP Irix Solaris Security in Globus (4) • assumes grid consists of multiple trust domains • assumes resource pool and user population are large and dynamic • interoperate with local security solutions - local security policies differ • authentication exportable - cannot directly or indirectly require use of bulk privacy Security in Globus (5) • uniform credentials/certification - a user will be associated differently with site it has access to single logon - number of processes used in a computation will be dynamic access control Security in Globus (8) Security in Globus (6) Grid Security Infrastructure • GSI provides authentication and data integrity (data signing, not encryption) services for Unix and Windows client/server programs • Can utilize an X.509 PKI • GSI library is layered on top of the SSLeay • Performs the X.509 certificate handling and SSL protocol. User Assignment of credentials to “user proxies” User Proxy Globus Credential GRAM Process GSI Process Kerberos Single sign-on via “grid-id” Site 2 Site 1 Ticket CREDENTIAL Authenticated interprocess communication Mutual user-resource authentication Process GRAM Process GSI GSSAPI: multiple Public Key low-level mechanisms Certificate Process Process Mapping to local ids Security in Globus (7) Technology Standards SSH PGP SSL X.509 PKI Kerberos DCE IPSec VPN Security Requirements Authentication Authorization x Assurance x x x x x x x x x x x x x x x x x x Accounting x x Audit x x Integrity x x x x x x Confidentiality x x x x x x x Summary • • • • Computer security is machine access centric Network security is network access centric Grid security is application centric Inter-domain communications based upon common security standards such as PKI. • Metacomputing approach that embrace security standards will be more widely adopted. Sources: Clifford Neuma n Sec urity, Ac c ounting , Assura nc e Cha p ter 16 The Grid : Bluep rint for a Future Com p uting Infra struc ture R. Butler, D. Eng ert, I. Foster, C. Kesselm a n, S. Tuec ke, J. Volm er, V. Welc h Desig n a nd Dep loym ent of a Na tiona l-Sc a le Authentic a tion Infra struc ture http :/ / w w w .g lob us.org / d oc umenta tion/ inc om ing / g si-d ep loy.p d f PKI/ GSI: NPACI's Pub lic Key Infra struc ture/ Grid Sec urity Infra struc ture An interview w ith SDSC's Wa yne Sc hroed er NPACI Online Volum e IV Issue 5 - Ma rc h 8, 2000 http :/ / w w w .np a c i.ed u/ online/ v4.5/ p ki-g si.htm l I. Foster, C. Kesselm a n, G. Tsud ik, S. Tuec ke A Sec urity Arc hitec ture for Comp uta tiona l Grid s 1) ftp :/ / ftp .g lob us.org / p ub / g lob us/ p a p ers/ sec urity.p d f Comp uter Sec urity Ba sic s Deb ora h Russell a nd G.T Ga ng emi Sr. Sec urity in Comp uting Cha rles P. Pfleeg er Netw ork Sec urity Cha rlie Ka ufma n, Ra d ia Perlma n, Mike Sp ec iner Comp uter Sec urity Dieter Gollma nn Und ersta nd ing Pub lic -Key Infra struc ture Conc ep ts, Sta nd a rd s, a nd Dep loyment Consid era tions Ca rlisle Ad a ms Steve Lloyd Glob us Sec urity Infra struc ture (GSI) http :/ / w w w .g lob us.org / sec urity/ A Sec urity Arc hitec ture for Comp uta tiona l Grid s I. Foster, C. Kesselma n, G. Tsud ik, S. Tuec ke, Proc . 5th ACM Conferenc e on Comp uter a nd Communic a tions Sec urity Conferenc e ftp :/ / ftp .g lob us.org / p ub / g lob us/ p a p ers/ sec urity.p d f GSSAPI SSLEAY for Glob us Sec urity Presenta tion b y Doug la s Eng ert http :/ / w w w .g lob us.org / p resenta tions/ g ssa p i/ sld 001.htm A New Mod el for Sec urity for Meta systems Steve J. Cha p in, Chenxi Wa ng , Willia m A. Wulf, Fritz Kna b e, a nd And rew Grimsha w Leg ion System Ad ministra tor Ma nua l 1.6 1) http :/ / w w w .c s.virg inia .ed u/ ~leg ion/ d oc umenta tion/ sysa d min_1.6.p d f