The Semantic Firewall EPSRC Pilot Projects Meeting 26 March 2004 NESC Overview • • • • • Project goals Motivation Approach Current status Next steps The Semantic Firewall • Started Oct’03 – 24 months duration, 42 person-months effort • Project team: – Mike Surridge, Darren Marvin, Steve Taylor (IT Innovation) – Terry Payne, Ron Ashri (IAM, Southampton) – support from NEC and U.Sheffield • Goals – investigate an “adaptive” perimeter defence for Grids – evaluate against test cases from EC GEMSS Damn Those Pesky Firewalls Permitted Access to Restricted Services Managed Server Resources FIREWALL Permitted Grid Access New Vulnerability User Managed Workstations More Trouble with Firewalls Service Tunnel GSI Delegation and Trust Proxy Proxy Process Process Proxy Proxy Process Process The Grid “Arms Race” • Sysadmins (rightly) wish to retain control – firewalls block P2P/Grid connections with other sites • Users (rightly) wish to get on with their work – develop sneaky ways around the firewalls – tunnelling over HTTP, SSH, etc • Sysadmins close the tunnels – preventing crackers hopping on board – but reducing functionality of the network • Result: – applications/grids may stop working within a year – everyone wastes time and effort The Semantic Firewall Project Tasks • WP1:M01-06: Semantic representations – overall requirements analysis – evaluation and selection of ontology and standards • WP2:M01-12: Platform design and implementation – service-oriented message-routing gateway – basic authentication and access control mechanisms • WP3:M07-18: Semantic reasoning features – integrating adaptive reasoning into base platform – investigating adaptive/negotiated access control • WP4:M19-24: Evaluation – using real-world application from U.Sheffield – contributed by EC GEMSS (Medical Simulation) Motivating Scenario Grid Client Grid Compute Service (1b) Request Run Job HTTPS / SOAP HTTPS / SOAP (3) Run Job (4) Notify Client Output Available AP SO TP AP HT SO TP S/ Semantic Firewall authorises requests initiated from outside the client site based on the combination of sys admin policy and process definition S/ HT (1a) Open Authorisation to Data (2) Get Input Data Semantic Firewall uses a process-based authorisation to identify valid incoming messages Traditional Firewall Semantic Firewall Data Service System Design • Inputs: SFW Knowledge Base SFW Reasoner Site policies Service descriptions Application workflows Policy conflict detection Workflow analysis Message interpretation – site policies – service descriptions – application workflows • Reasoner: – detects conflicts – derives access rules • Communications: SFW Administration Static configuration Logging system Administration GUI SFW Communications Event handling Message enforcement – enforces access rules – uses PBAC approach • Administration: – configuration and logging – network admin GUI Process Based Access Control • Dynamic approach to Grid authorisation – – – – applied at service provider on a “per-site” basis controls access to resources (cf WS-RF) access rights managed by authenticated clients actions constrained by allowed processes • Process-based access control – does not use mapping to local user id – does not use centralised authorisation services – need not use role-based access control • Process semantics are core to security Semantic Representations • Focused on process-oriented languages – for expression of workflows – for expression of domain policies • Several candidate languages investigated – – – – DAML-S process model BPEL4WS workflow language ebXML business process models WS-Choreography • Preliminary conclusions: – platform should use WS-Security and WS-Policy – service models are likely to use DAML-S – no decision yet on application workflows Current Status • Semantics investigation almost complete – still investigating WS-Choreography • Platform design almost complete – reusing existing security components • Dissemination started – paper at AAAI Symposium 2004 – website up (just) and discussion list open • SFW is attracting considerable interest – Grit Denker @ SRI and Jeff Bradshaw @ IHMC – growing industrial interest and input Next Steps • Finish selection of process representations • Implement base platform – PBAC and WS-Security infrastructure – administration interfaces • Introduce semantics technology – policy conflict detection – derivation of low-level PBAC rules • Evaluation (in 2005) • Continue to expand the community of interest – scenarios especially welcome!