Setting up and Managing National CA for GRID Computing - PowerPoint PPT Presentation

1 / 38
About This Presentation
Title:

Setting up and Managing National CA for GRID Computing

Description:

... that seek to share and use diverse resources in a coordinated fashion ... Defines a certificate format (originally based on X.500 Directory Access Protocol) ... – PowerPoint PPT presentation

Number of Views:90
Avg rating:3.0/5.0
Slides: 39
Provided by: elizab183
Learn more at: http://www.ituarabic.org
Category:

less

Transcript and Presenter's Notes

Title: Setting up and Managing National CA for GRID Computing


1
Setting up and Managing National CAfor GRID
Computing
H I A S T
Regional Seminar on Identity Management and
E-signatures Damascus, 29-31 October 2007
  • Ghassan SABA, HIAST

2
Outline
  • What are Grids?
  • Security in the GRID
  • GRID Certificates
  • HIAST Plan to be the Syrias CA for GRID
    computing
  • CP/CPS preparation
  • CA design issues

3
What are Grids?
  • Set of services over the Internet, allowing
    geographically dispersed users to share
  • computer power
  • data storage capacity
  • remote instrumentation
  • Grid Computing is a particular example of
    distributed computing based on the idea to share
    resources on a global scale

4
What Grid is AboutAggregation in Virtual
Organizations
  • Distributed resources and people
  • Linked by networks, crossing administrative
    domains
  • Sharing resources, common goals
  • Dynamic behaviors
  • Fault-tolerant

R
R
R
R
R
R
R
R
R
R
R
R
R
R
VO-A
VO-B
5
What is VO
  • Virtual organizations (VOs) are collections of
    diverse and distributed individuals that seek to
    share and use diverse resources in a coordinated
    fashion
  • Users can join into several VOs, while resource
    providers also partition their resources to
    several VOs.

6
Requirements for Grid computing
  • An Authentication and Authorization system,
    providing secure access to resources
  • secure communication, secure data, resources etc.
  • security across organisational boundaries
  • single sign-on for users of the Grid
  • A mechanism (middleware) for managing and
    allocating resources to users and applications
  • A reliable, high-performance network connection
    amongst resources

7
Needs for new security standard
  • Several security standards exist
  • Public Key Infrastructure (PKI)
  • Secure Socket Layer (SSL)
  • Kerberos
  • Need for a common security standard for Grid
    services
  • Above standards do not meet all Grid requirements
    (e.g. delegation, single sign-on etc.)
  • Grid community mainly uses X.509 PKI for the
    Internet
  • Well established and widely used (also for www,
    e-mail, etc.)

8
Why Grid Security is Hard?
  • Dynamic formation and management of virtual
    organizations (VOs)
  • VO Resources and users are often located in
    distinct administrative domains
  • Interactions are not just client/server, but
    service-to-service on behalf of the user
  • Requires delegation of rights by user to service
  • Services may be dynamically instantiated
  • Policy from sites, VO, users need to be combined
  • Varying formats
  • Want to hide as much as possible from
    applications!

slide based on presentation given by Carl
Kesselman at GGF Summer School 2004
9
The Grid Trust solution
  • Instead of setting up trust relationships at the
    organizational level, set up trust at the
    user/resource level
  • Grid users must belong to a Virtual Organization
  • Sets of users belonging to a collaboration
  • Each VO user has the same access privileges to
    Grid resources
  • VOs maintain a list of their members
  • The list is downloaded by Grid machines to map
    user certificate subjects to local pool
    accounts
  • Sites decide which VOs to accept
  • Users are able to set up dynamic trust domains
  • Personal collection of resources working together
    based on trust of user

10
Use Delegation toEstablish Dynamic Distributed
System

11
Proxy
  • Consists of a new certificate with new public,
    private keys, and owners identify (/CNproxy
    added to name)
  • Certificate signed by owner (not CA)
  • Proxy given limited lifetimes
  • Proxys private key does not need to be kept as
    secure as owners private key - setting file
    permissions usually sufficient

12
Proxy Certificates

13
Grid Security Infrastructure (GSI)
  • de facto standard for Grid middleware
  • Based on PKI
  • Implements some important features
  • Single sign-on no need to give ones password
    every time
  • Delegation a service can act on behalf of a
    person
  • Mutual authentication both sides must
    authenticate to the other
  • Introduces proxy certificates
  • Short-lived certificates including their private
    key and signed with the users certificate
  • Proxies provide single sign-on
  • Enable user and its agents to acquire additional
    resources without repeated authentication
    (passwords)

14
GSI General Overview

Proxies and delegation (GSI Extensions) for
secure single Sign-on
Proxies and Delegation
SSL/ TLS
PKI (CAs and Certificates)
SSL for Authentication and message protection
PKI for credentials
Based on Slide from Globus Tutorial
15
X.509 certificates and authentication
B
A
A
As certificate
Verify CA signature
Random phrase
Encrypt with A s private key
Encrypted phrase
Decrypt with A s public key
Compare with original phrase
16
Grid Certificates (X.509)
  • X.509 is ITU Standard
  • ITU-T Recommendation X.509 (1997 E). Information
    technology - Open Systems Interconnection - The
    Directory Authentication Framework
  • Defines a certificate format (originally based on
    X.500 Directory Access Protocol)
  • Latest standard X.509 version 3 certificate
    format
  • X.509 certificate includes
  • User identification (someones subject name)
  • Public key
  • A signature from a Certificate Authority (CA)
    that
  • Proves that the certificate came from the CA.
  • Vouches for the subject name
  • Vouches for the binding of the public key to the
    subject

17
Involved entities

Certificate Authority
User
Public key Private key certificate
Resource (site offering services)
18
Certificate Authorities
  • Issue certificates for users, programs and
    machines
  • Check the identity and the personal data of the
    requestor
  • Registration Authorities (RAs) do the actual
    validation
  • Manage Certificate Revocation Lists (CRLs)
  • They contain all the revoked certificates yet to
    expire
  • CA certificates are self-signed

19
Certificate Request

User generatespublic/privatekey pair.
User send public key to CA along with proof of
identity.
CA confirms identity, signs certificate and sends
back to user.
CertificateRequest Public Key
Public
Certificate Authority
Private Key encrypted on local disk
slide based on presentation given by Carl
Kesselman at GGF Summer School 2004
20
Authorisation Requirements
  • Detailed user rights assigned
  • User can have certain group membership and roles
  • Involved parties
  • Resource providers.
  • Keep full control on access rights.
  • The users Virtual Organisation.
  • Member of a certain group should have same access
    rights independent of resource.
  • Resource provider and VO must agree on
    authorisation
  • Resource providers evaluate authorisation granted
    by VO to a user and map into local credentials to
    access resources

21
HIAST Plan to be the Syrias CAfor GRID computing
  • HIAST was nominated to be the Registration
    Authority (RA) for GRID computing community in
    Syria in 2006
  • We are now working on the following points
  • Studying how to meet all EUGRIDPMA requirements
    until acceptance
  • Subscribing to EUGRIDPMA mailing list
  • Evaluating and checking the CP/CPS documents
    published by other CAs
  • Writing a draft document of HIASTs CP/CPS
  • Evaluating the options to begin acquisition and
    subsequent installation of necessary hardware and
    software
  • Developing a secure website to be the interface
    for certificate requests and to help users find
    all information regarding CA, CRL, CP/CPS
    documents and contact information
  • Interacting with EUGRIDPMA to review all the
    above steps in details
  • Setting up the CA and making it operational
  • Getting the accreditation and announcing the
    service

22
The main points which will be coveredthrough the
CP/CPS Document
  • CP (Certificate Policy) is to establish WHAT
    participants must do
  • CPS (Certification Practice Statement) is to
    disclose HOW the participants perform their
    functions and implement control
  • 1. CA Role
  • Issuing certificates and CRLs
  • Publishing the issued certificate and CRLs
  • Managing all the hardware and software

23
The main points which will be coveredthrough the
CP/CPS Document
  • 2. RA Role
  • Authenticating the user which makes the request
  • Verifying the information provided by the user
  • Notifying the CA all the requests
  • 3. Request Types
  • Certificate request
  • Renewal request.
  • Revocation request
  • 4. Certificate Types
  • Personal certificate
  • Server/Host certificate
  • Service certificate

24
  • 5. The Procedure in details will include
  • How to design secure certificate request (new,
    renewal and revocation)
  • How to validate the identities of certificate
    requests.
  • Way of authentication
  • Communication between the CA and RA
  • 6. The required CA Equipment
  • Dedicated computer system not connected to
    network
  • Software needed (OpenCA)
  • 7. Physical control and security

25
Role of Certification Authority
  • Verifies certificate request information
  • Generates and digitally signs the certificate
  • Revokes certificate if information changes
  • Revokes certificate if private key is disclosed
  • Support certificate hierarchies

26
Certificate Policy (CP)
  • Who is responsible for the RA/CA operation?
  • What is the community served?
  • What are the rules for identifying Subjects?
  • Whats in a certificate?
  • What constraints are there on operation of the
    CA?
  • What must be done if something goes wrong?

27
CA Design issues
  • Main points to cover in design
  • Structure of CA online or offline?
  • Structure of RAs network
  • CA/RA responsibilities
  • Identity validation process for new certificate
    requests
  • Secure communication of RAs and CA
  • Properties of CA, user, host and service
    certificates and private keys (Refer to RFC 3280
    for certificate profile)
  • Certificate extensions
  • Passphrase for private keys

28
CA Design issues (2)
  • Main points to cover in design (cont'd)
  • Structure your CP/CPS as defined in RFC 3647
  • Define revocation situations and CRL (Certificate
    Revocation List) life time (Refer to RFC 3280 for
    CRL profile)
  • Describe clearly certificate request handling
  • Security of dedicated CA (physical security, how
    to keep private key and passphrase for root CA
    cert)
  • Web repository, what to publish on CA website
  • Specify necessary records and archives
  • Define a CA disaster recovery plan

29
CP/CPS Preparation
  • 1. Make a request for an OID arc
  • Every CP/CPS version of every CA must have a
    unique object identifier. Your organization, that
    is responsible to operate the CA must have a
    valid OID arc. There are two alternatives to have
    it
  • You can apply to IANA for an OID arc.
    (http//www.iana.org/cgi-bin/enterprise.pl) it
    takes almost two months!
  • HIAST OID is 1.3.6.1.4.1.27601
  • 2. You can apply to IGTF for an OID arc.
    (http//www.eugridpma.org/objectid/)

30
Establish your CA website
  • CA web repository must include
  • General info about your CA (homepage)
  • CA root certificate
  • CRL URL
  • CP/CPS policy document
  • official contact email address, responsible for
    CA
  • physical postal contact address
  • ssl protected web form for certificate requests
    (either via OpenCA or your own scripts)

31
Operational Requirements
  • CA must protect its private key appropriately
  • Must not generate key pairs for Subjects
  • Certificate management
  • Revocation required at Basic or higher LOA
  • Requires standard CRL allows for OCSP
  • Relying Party required to check for revocation
  • Suspension not used
  • Security Audit Procedure
  • Everything that might affect the CA or RA

32
Physical, Procedural and Personnel Security
Controls
  • CA Roles
  • Administrator - sysadmin installs configures
  • Officer - approves issuance and revocation of
    PKCs (Public Key certificates)
  • Operator - routine system operation backup
  • Auditor - reviews syslogs oversees external
    audit
  • Separation of roles required
  • at least 2 people (Admin./Op. Officer/Auditor)
  • at least 3 at higher LOAs
  • Some tasks require action by 2 out of 4 persons

33
Installation of CA
  • X.509 standard, public key infrastructure (PKI)
    used in Grid Certification Authorities
  • OpenSSL is the preferred tool for X.509
    operations including creating and signing
    certificate requests, CRLs, revoking
    certificates, renewing certificates.
  • See main openssl commands on page
    http//www.openssl.org/docs/apps/openssl.html
  • You have two main alternatives to set up your CA
  • Write your own scripts
  • Install and run OpenCA

34
Install and run OpenCA
  • You can download and install free software OpenCA
    for your CA/RA operations including online
    certificate requests
  • http//www.openca.org/
  • It uses OpenLDAP, OpenSSL, Apache facilities.
  • It is suitable for a large scale CA.

35
Maintenance of CA
  • Below are the most important issues to follow for
    a successful operation
  • Prepare the environment for dedicated offline CA
    machine.
  • Maintain CA protection at best efforts. (Smart
    card, security personnel, safes...)
  • Train your RA personnel.
  • Always keep secure communication between RAs and
    CA.
  • Keep your RA staff as distributed as possible.
    (local RAs for identity validation)

36
Maintenance of CA (2)
  • Most important issues for CA maintenance
  • Give importance to identity validation.
    (face-to-face meeting, checking from an ID card)
  • Show immediate reaction to revocation
    circumstances.
  • Be on time for periodical CRL issuing and
    publishing.
  • Know OpenSSL commands well.
  • Make sure you have the accurate records as you
    have stated in your CP/CPS.

37
Acknowledgements
  • Some slides of this presentation are taken or
    inspired from the following presentations and/or
    web sites
  • Carl Kesselman, GRID Security Overview, GGF
    Summer School 2004
  • Asli Zengin, Rome, Tutorial for Certification
    Authority Managers, 12.09.2006
  • Heinz Stockinger, Grid Security, EMBRACE Grid
    Tutorial, Helsinki, 16 June 2006
  • Globus Web site, www.globus.org

38
  • Thank you
  • For your
  • Attention
Write a Comment
User Comments (0)
About PowerShow.com