• Nie Znaleziono Wyników

dyrda-mgr-08-pr

N/A
N/A
Protected

Academic year: 2021

Share "dyrda-mgr-08-pr"

Copied!
16
0
0

Pełen tekst

(1)

Security in Component

Grid Systems

Michal Dyrda

Master of Science Thesis

Faculty of Electrical Engineering, Automatics, Computer Science and Electronics Institute of Computer Science

(2)

Outline

• Introduction

• MSc Thesis Goals, Target Environment

• Security Concepts in (Component) Grid

Systems on Example of H2O

• Overview, Authentication in H2O

• Concept of GSI Authenticator

• Authenticator Validation

• Performed Tests, Threat Analysis, Performance Analysis and Discussion

• Work status

(3)

MSc Thesis Goals

• Identification and analysis of security

architecture and shortages in H2O

• Overview of available solutions for H2O

security enhancements

• Concept and development of a security

solution for H2O and MOCCA that would

answer the presented shortcomings

• Proof of correctness and usefulness of the

created solution

• Build, configuration and usage description

• Identification of future work

(4)

Target Environment

• H2O

• Middleware platform for distributed computing • Providers setup H2O kernel (container)

• Allowed parties can deploy pluglets (components)

• MOCCA

• Distributed component framework • CCA-compliant

• Build on top of H2O platform • Uses H2O security mechanisms

(5)

H2O / MOCCA structure

• CCA components mapped to H2O Component Pluglets and deployed in H2O Kernel

• MOCCA Main Builder and Builder Pluglets used for managing and combining deployed pluglets

(6)

Security Concepts in (Component) Grid

Systems on Example of H2O

A

uthentication

• Described soon…

A

uthorization

• JAAS; based on authentication ‘Subject’

• Communication security

• Message integrity and confidentiality • RMIX framework, TLS / SSL

• Single Sign-On and delegation

• Sandboxing

(7)

Authentication in H2O

• Extensible, pluggable architecture

• Tunneled

• Chain of authenticators

• Based on message exchange

• Similar to Pluggable Authentication Modules

• Returns Subject object – for JAAS authorization

• Only basic Password Authenticator by default

• Low level of security • Simple to intercept

• Not applicable for SSO and delegation

• Hardly possible to manage validity lifetime • Careless users…

(8)

Discussion of Available Solutions

Globus Security Infrastructure

• Official specification for

safe communication in grid environment

• Widely deployed on production infrastructures (EGEE)

• Based on existing mechanisms: • Public Key Cryptography,

Public Key Infrastructure, X.509, TLS

• Single Sign-On and delegation using proxy certificates:

• based on a new key pair

• digitally signed by the owner of the original certificate

• with limited lifetime

MyProxy -

software for managing security credentials

• release from the location of our permanent credentials

• use grid services from different locations and terminals

Shibboleth -

Federated Web Single Sign-On framework

• no user certificates

• login requests are redirected to user's home organization

• attribute-based access control • used mainly for integrating Web

(9)

Concept of GSI Authenticator

• H2O-applicable authenticator

• based on PKI and X.509 • compliant with GSI

(10)

Implementation of GSI Authenticator

• Identity introduction

– with (proxy) certificate

• Kernel verifies validity and checks if the issuing CA is trusted

• Identity confirmation

– simple challenge-response algorithm: • Kernel encrypts a nonce and sends it to the client

• Client decrypts and signs the nonce and sends back to the kernel

(11)

Authenticator Validation

• Verified cases:

• Valid credentials

correct

• The lifetime of the proxy is over

• The subject is unknown to the kernel

• The issuer is not trusted by the kernel

• The certificate is revoked

• Threat analysis

• Attacks on the system

• Cryptanalysis attacks, network eavesdropping, session hijacking, man-in-the-middle attack

• Attacks on the authenticator

(12)

Performance Analysis and Discussion

(1/2)

• Authentication mechanism analysis:

• Authenticators comparison

• SSL/TLS and server authentication overhead • Risk analysis

• How much performance can we gain?

• How much security are we ready we loose?

0,0 s 5,0 s 10,0 s 15,0 s 20,0 s 25,0 s 30,0 s 35,0 s 40,0 s 0 5 10 20 Aut hen ti ca ti on ti me chain length

(13)

• GSI Authenticator analysis

• Chain validation time

• Execution time of particular elements 0,2 % 91,34% 0,6% 0,1%2,2% 5,5 % Credential read Key generation Proxy creation

Challenge decryption (twice) Challenge encryption (twice) Validation

(14)

Summary of Work Done

• Identification and analysis of security architecture and shortages in H2O

performed

• Overview of available solutions for H2O security enhancements

GSI-based solution selected

• Concept and development of a security solution for H2O and MOCCA that would answer the presented shortcomings

GSI Authenticator created, integrated with H2O

• Proof of correctness and usefulness of the created solution

performance and usage tests, threat analysis,

usage examples for both H2O and MOCCA performed • Build, configuration and usage description

provided in MSc Thesis • Identification of future work

(15)

Future Work

Delegation of trust anchors

CRL update and the Online Certificate

Status Protocol (OSCP) for certificate

revocation verification

MyProxy for credentials storage

More sophisticated authorization

(16)

GSI Authenticator

Please visit the following websites:

• H2O :

http://dcl.mathcs.emory.edu/h2o

• MOCCA :

http://mocca.icsr.agh.edu.pl

• VIROLAB :

http://virolab.cyfronet.pl

Cytaty

Powiązane dokumenty

Cenne informacje przynoszą także przechowywane tamże akta polskich komitetów wyborczych, pozwalając na odnalezienie i opisanie działalności ugodowców w polskich

I już do woli można uda ­ wać, że się cokolwiek znaczy, że się kimkolwiek jest, że dotychczasowy pół- -analfabetyczny bełkot jest czymś wartym do

Rys. Ca³kowite zaæmienie S³oñca sfotografowane 29 III 2006 r. Widoczna korona s³oneczna. Total solar eclipse photographed on 29th March 2006 in Turkey. Solar corona is visible.

Artykuł jest próbą przyjrzenia się dotychczasowym, utartym w nauce poglądom dotyczącym kilku zabytków (pieśni Cantilena inhonesta, legendy o świętej Dorocie, najstarszych

W celu identyfikacji charakteru plastycz- nego płynięcia materiału procesie KOBO do prób wyciskania przygotowano wlewki składa- jące się z naprzemiennie ułożonych

Jak można zauważyć głównymi zdetektowany- mi pierwiastkami były magnez, krzem i tlen; można zatem przypuszczać, że fazą azbestową obecną w analizowanej płycie eternitowej

such projects have a strong local impetus and the benefit of rich local resources, but also have the potential to enrich the methods and practices of American studies by

In 1921 (following public events of ‘terrible beauty’ on Irish, European, and world stages), Yeats published Four Plays for Dancers, which included two Cuchulain plays: At the