Who do you Trust? The roles of certificates, certification - - PowerPoint PPT Presentation

who do you trust
SMART_READER_LITE
LIVE PREVIEW

Who do you Trust? The roles of certificates, certification - - PowerPoint PPT Presentation

Who do you Trust? The roles of certificates, certification authorities and the IGTF in Grid Computing T h e A m e r i c a s G r i d Policy Management Authority Prof. Vinod Rebello Instituto de Computao Universidade F ederal F


slide-1
SLIDE 1

Who do you Trust?

The roles of certificates, certification authorities and the IGTF in Grid Computing

  • Prof. Vinod Rebello

Instituto de Computação Universidade F ederal F luminense Brazil vinod@ic.uff.br

T h e A m e r i c a s G r i d Policy Management Authority

slide-2
SLIDE 2

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 2

A talk about PKI - Why me?

  • Resource provider and grid operator and user
  • Manager of the IGTF approved Brazilian and the

Latin American and Caribbean Catch-all Grid Certificate Authorities

  • Current Chair of the TAGPMA
  • Former Chair of the IGTF

There is are worlds outside of Grid Computing…

  • Chair of the Brazilian Educational PMA (ICPEDU)
  • Brazilian Federal PKI Service

And these worlds are colliding!

slide-3
SLIDE 3

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 3

The Grid Computing Model

Grid/Cloud

  • ffering

services

In this generic model, institutions and businesses own fewer

  • f their own resources. Third parties provide facilities; users

get access to services. Businesses themselves can also offer services over the Grid.

slide-4
SLIDE 4

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 4

Role of Computer Security

  • Confidentiality: protection against data disclosure to

unauthorized persons

  • I ntegrity: protection against data modification
  • Availability: protection against data disponibility
  • I dentification & Authentication (I&A)

– Provide a way of identifying entities, and controlling this identity

  • Non-repudiability

– Bind an entity to its actions

  • Authorization

– Identity combined with an access policy to grant rights to perform some action

slide-5
SLIDE 5

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 5

Asymmetric Cryptography

  • Use non-reversible functions and a key

pair

– What one key encrypts, the other decrypts

  • Keep one key private

– Only you can decrypt

  • Let the other be public

– Everyone can encrypt

  • Security relies on

– F-1 not being found

Hello $w!4& F(x)

priv

Hello $w!4& F(x)

pub

slide-6
SLIDE 6

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 6

Assymetric Key Pairs

  • Every user splits a key pair into a private and a

public key.

priv

The public key is known by everybody. The private key should not be known by anyone else. It may be protected by hardware.

pub

slide-7
SLIDE 7

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 7

X.509 Public Key Certificate

  • A standardised way to associate a public key with

an entity

  • A digitally signed identity document

– Can identify people, computers, services, …

Version Serial number Issuer identity Validity period User identity Public key Extension fields

(Extension data: what type

  • f vehicles the person is

authorized to drive)

slide-8
SLIDE 8

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 8

Certificates and PKIs

  • Certificates enable:

– Clients to authenticate servers – Servers to authenticate clients – Public key exchange without Public Key Server

  • No disclosure of private/ secret keys.
  • Special features:

– chains of CAs, to distribute the task of issuing certificates – Certificate Revocation List, to disable certificates

  • CA is the only entity able to create/ modify the certificate

– the CA has to be trusted

slide-9
SLIDE 9

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 9

Certification Authority

  • The role of the CA is to manage the certificate life

cycle: create, store, renew, revoke

User data Public key CA signature User certificate User data Public key

CA Trusted Third Party

slide-10
SLIDE 10

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 0

Establishing Trust

  • The dynamic cross-organizational resource

sharing gives us a problem

– No initial trust, different policies, different mechanisms – no central point of control in Grids

  • We have to provide

tools to make this as painless as possible

slide-11
SLIDE 11

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 1

Solving the Trust Problem

  • Trusted Third Parties

– Independent identity assessment providers – The most commonly used today

  • Federations

– Organizations trust each other to identify their own users – Finite “membership” constellations

  • Web of Trust

– Users trust each other to identify others – Less control, scalability arguable

slide-12
SLIDE 12

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 2

International Grid Trust Fed.

  • Commissioned: Mar 2003 (Tokyo) - Chartered:

October 5th, 2005 at GGF 16 (Chicago)

  • Federation of European, Asian, and Western

Hemisphere Policy Management Authorities

– Focused on Identity management and authentication for Grids

  • Establishment of top level CA registries and related

services

– Root CA certificates, CA repositories and CRL publishing points. – Uses TERENA Academic CA Repository (TACAR)

  • Standards

– Certificate policies, Certificate profiles, Accreditation – Open Grid Forum publishes standards and community best practices.

slide-13
SLIDE 13

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 3

Building the Federation

  • Resource Providers and Relying Parties together shape the

common minimum requirements

– Several profiles for different identity management models

  • different technologies

– Authorities testify to compliance with profile guidelines – Peer-review process within the federation to (re) evaluate members on entry & periodically – Reduce effort on the relying parties

  • single document to review and assess for all Authorities
  • collective acceptance of all accredited authorities

– Reduce cost on the authorities

  • but participation in the federation comes with a price
  • … the ultimate decision always remains with the RP
  • Policies are technology independent
slide-14
SLIDE 14

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 4

The Regional PMAs

The Americas Grid PMA Asia Pacific Grid PMA European Grid PMA

slide-15
SLIDE 15

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 5

TAGPMA Membership

CANARI E – Canada DOEGrids ( ESNet) – USA EELA – I nternational Ferm i National Accelerator Laboratory - USA HEBCA/ USHER/ Dartm outh College – USA I BDS ( ANSP) - Brazil LCG – I nternational NCSA – USA NERSC – USA Open Science Grid – I nternational Purdue University – USA REUNA – Chile San Diego Supercom puter Center – USA TACC – USA TeraGrid – USA Texas High Energy Grid – USA University of Virginia – USA UFF – Brazil ULA – Venezuela UNAM – Mexico UNLP – Argentina I GTF Accredited CA Operators CA Accreditation in progress I nterested in accreditation Relying Party

slide-16
SLIDE 16

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 6

What Are Grid PKIs For?

  • Exist to serve the grid community in terms of

authentication

– X.509 certificates are an essential component of Grid security mechanisms – Authentication supports diverse authorization methods (including ongoing research) – X.509 Certification Authorities provide a focal point for policy and key lifecycle management – IGTF and regional PMAs provide coordination and interoperability standards for Grid PKIs

slide-17
SLIDE 17

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 7

Fostering NGIs in LA?

  • Fostering National Grid Initiatives to meet the

demands of Latin America

– Not just computer science, nor is it just e-science, its e-verything! – Learn from but not necessarily copy other NGIs

  • Sustainability

– Maintenance support for large scale, production class infrastructures – Tools to improve accessibility – More users – Integrate Grid PKI with other broader scoped PKIs

  • UFF BrGrid CA will be an integral part of the Brazilian

Educational and Research PKI (ICPEDU).

slide-18
SLIDE 18

I I LA Grid W orkshop 3 0 th Oct 2 0 0 8 Vinod Rebello – vinod@ic.uff.br 1 8

Contact Information

  • Argentinean National Grid CA – UNLP Grid CA

http: / / www.pkiunlpgrid.unlp.edu.ar

  • Brazilian National Grid CA – UFF BrGrid CA

http: / / brgrid.ic.uff.br

  • Chilean National Grid CA – REUNA CA

http: / / reuna-ca.reuna.cl

  • Latin American and Caribbean Catch-all CA –

UFF LACGrid CA http: / / lacgridca.ic.uff.br

  • TAGPMA http: / / www.tagpma.org
  • Questions?
  • My email – vinod@ic.uff.br