Grid Security Concepts: Richard Sinnott
Grid Security Concepts: Richard Sinnott
Richard Sinnott
http://csperkins.org/teaching/2004-2005/gc5/
                                         Revised Module Outline
                                         • If it is not secure
                                             – Large communities will not engage
                                                 • medical community, industry, financial community …
                                             – Legal and ethical issues possible to be violated with all sorts of
                                               consequences
                                                 • e.g. data protection act violations and fines incurred
                                             – Expensive (impossible?) to repeat some experiments
                                                 • Huge machines running large simulations for several years
                                             – Trust (more later) is easily lost and hard to re-establish
                                             – Grid resources are a dream for hackers
                                                 • Huge file storage for keeping their “dodgy data”
                                                 • Perfect environment for launching attacks like distributed denial of service
                                                      – Not just access to one machine
Copyright © 2004 University of Glasgow
                                           All are important for Grids but some applications may have more
                                                        emphasis on certain concepts than others
Copyright © 2004 University of Glasgow
                                         Security Concepts::Authentication
                                         • Authorisation
                                            – concerned with controlling access to services based on policy
                                                • Can this user invoke this service making use of this data?
                                                • Complementary to authentication
                                                     – Know it is this user, now can we restrict/enforce what they can/cannot do
                                            – Many different contenders for authorisation infrastructures
                                                •   PERMIS
                                                •   CAS
                                                •   VOMS
                                                •   AKENTI
                                                •   VOM
                                                • …Explored later…
Copyright © 2004 University of Glasgow
                                         Security Concepts::Auditing
                                         • Auditing
                                            – the analysis of records of account (e.g. security event logs) to investigate
                                              security events, procedures or the records themselves
                                                • Includes logging, intrusion detection and auditing of security in managed
                                                  computer facilities
                                                     – well established in theory and practice
                                                         » Grid computing adds the complication that some of the information required
                                                             by a local audit system may be distributed elsewhere, or may be obscured by
                                                             layers of indirection
                                                         » e.g. Grid service making use of federated data resource where data kept and
                                                             managed remotely
                                                • Need tools to support the generation of diagnostic trails
                                                     – Do we need to log all information?
                                                     – How long do we keep it for?
Copyright © 2004 University of Glasgow
                                                     – …
                                         Security Concepts::Confidentiality
• Confidentiality
                                         • Privacy
                                            – particularly significant for projects processing personal information, or
                                              subject to ethical restrictions
                                                • e.g. projects dealing with medical, health data
                                            – Privacy requirements relate to the use of data, in the context of consent
                                              established by the data owner
                                                • Privacy is therefore distinct from confidentiality, although it may be supported
                                                  by confidentiality mechanisms.
                                                • Grid technology needs a transferable understanding of suitable policies
                                                  addressing privacy requirements/constraints
                                                     – Should allow to express how such policies can be
                                                         » defined,
                                                         » applied,
                                                         » implemented,
Copyright © 2004 University of Glasgow
                                                         » enforced, …
                                         Security Concepts::Integrity
                                         • Integrity
                                            – Ensuring that data is not modified since it was created, typically of
                                              relevance when data is sent over public network
                                                • Technical solutions exist to maintain the integrity of data in transit
                                                     – Explore some of these in PKIs
                                                • Grid also raises more general questions
                                                     – e.g. provenance
                                                          » maintaining the integrity of chains or groups of related data
Copyright © 2004 University of Glasgow
                                         Security Concepts::Fabric Management
                                         • Fabric Management
                                            – consists of the distributed computing, network resources and
                                              associated connections that support Grid applications
                                                • impacts Grid security in two ways:
                                                    – an insecure fabric may undermine the security of the Grid
                                                    – fabric security measures may impede grid operations
                                                         » e.g. firewalls may be configured to block essential Grid traffic
Copyright © 2004 University of Glasgow
                                         Security Concepts::Trust
                                         • Trust
                                            – is that characteristic allowing one entity to assume that a second entity
                                              will behave exactly as the first entity expects
                                                • Trusted entities are those for which this expectation is assumed, with the
                                                  consequence that that data they originate are assumed to be correct; agreements
                                                  or about what entities are to be trusted, and to what extent, are therefore of
                                                  fundamental importance.
                                            – Important distinction between ‘trust management’ systems which
                                              implement authorisation, and the wider requirements of trust
                                                • e.g. health applications require the agreement between users and resources
                                                  providers of restrictions that cannot be implemented by access control
                                                    – e.g. restrictions on the export of software, or a guarantee that personal data is
                                                      deleted after use
                                                • therefore a need to understand and represent policy agreements between groups
Copyright © 2004 University of Glasgow
                                                sender                                         receiver
                                                           Encryption   Encrypted               Encrypted   Decryption
                                                  text                                                                   text
Copyright © 2004 University of Glasgow
                                                            key                                               key
                                                                                    Snooper?
                                         Symmetric Cryptography
                                                • The longer keys are left in storage, more likelihood of their being compromised
                                                    – Instead use Public Keys for short time and then discard
                                                    – Public keys can be freely distributed
                                                • Only Private Key needs to be kept long term and kept securely
                                         Public Key Algorithms
                                         • CA issues certificates
                                            – Could be to users, resources, other CAs, …
                                                • CA certificates can describe/limit trust relationship
                                         • Issuing certificate is indication of trust
                                            – CA trusts it is really you who is applying for and going to use this
                                              certificate
                                            – You (and others using this CA) trust that certificates are managed correctly
                                         • How to decide if CA is trustworthy?
                                            – Different choices
                                                • User decides to trust CA
                                                • CAs decide if they trust one another
                                                     – Certification paths used to track trust relationships
Copyright © 2004 University of Glasgow
CA2 CA3
                                                                                      CA1
                                                                       User2                            User3
User1
                                                                               CA
                                                         2. Check details
                                                                                1. Request certificate (and generate private key)
                                                         of request
                                                                                4. Download and install certificate in browser
                                                              RA                5. Download and install CRL
                                                                      3. Ok?   User
Copyright © 2004 University of Glasgow
                                                                                                                                                                                Temper-evident envelope
                                                   • So can read certificate without modifying contents
                                                         –    <certificate X signatureAlgorithm X signatureValue>          serialNumber
                                                                                                                                                         Certificate contents
                                              – Certificate contents
                                                   • Version                                                                 signature
                                                         –    1..3, 3= extensions included
                                                   • serialNumber                                                              issuer
                                                         –    Number given by issuer, unique for each issuer cert.
                                                                                                                              validity
                                                                » Useful for CRLs
                                                   • Signature                                                                subject
                                                         –    Algorithm identifier, e.g. XXX
                                                                                                                        subjectPublicKeyInfo
                                                   • Issuer
                                                         –    X.500 distinguished name (DN)
                                                                                                                          issuerUniqueId
                                                   • Validity
                                                         –    From-to dates/times                                          subjectUniqueId
                                                                                                                                               Options
                                                                 » 07 January 2004 17:48:23, 06 January 2005 17:48:23
                                                   • Subject                                                                 extensions
                                                         –    X.500 distinguished name for holder of private key        signatureAlgorithm
Copyright © 2004 University of Glasgow