Presentation is loading. Please wait.

Presentation is loading. Please wait.

20-May-03D.P.Kelsey, LCG-1 Security, HEPiX1 Grid Security for LCG-1 HEPiX, NIKHEF, 20 May 2003 David Kelsey CCLRC/RAL, UK

Similar presentations


Presentation on theme: "20-May-03D.P.Kelsey, LCG-1 Security, HEPiX1 Grid Security for LCG-1 HEPiX, NIKHEF, 20 May 2003 David Kelsey CCLRC/RAL, UK"— Presentation transcript:

1 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX1 Grid Security for LCG-1 HEPiX, NIKHEF, 20 May 2003 David Kelsey CCLRC/RAL, UK d.p.kelsey@rl.ac.uk

2 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX2 Overview LHC Computing Grid project (LCG) –Introduction: slides from Ian Bird (CERN) LCG Security Group Security technology Policies, procedures and other issues

3 CERN Ian.Bird@cern.ch3 LCG - Goals The goal of the LCG project is to prototype and deploy the computing environment for the LHC experiments Two phases: –Phase 1: 2002 – 2005 –Build a service prototype, based on existing grid middleware –Gain experience in running a production grid service –Produce the TDR for the final system –Phase 2: 2006 – 2008 –Build and commission the initial LHC computing environment F LCG is not a development project – it relies on other grid projects for grid middleware development and support

4 CERN Ian.Bird@cern.ch4 LCG - Milestones The agreed Level 1 project milestones for Phase 1 are:The agreed Level 1 project milestones for Phase 1 are: –deployment milestones are in red M1.1 - July 03First Global Grid Service (LCG-1) available M1.2 - June 03Hybrid Event Store (Persistency Framework) available for general users M1.3a - November 03LCG-1 reliability and performance targets achieved M1.3b - November 03Distributed batch production using grid services M1.4 - May 04Distributed end-user interactive analysis from “Tier 3” centre M1.5 - December 04“50% prototype” (LCG-3) available M1.6 - March 05Full Persistency Framework M1.7 - June 05LHC Global Grid TDR

5 CERN Ian.Bird@cern.ch5 LCG Regional Centres Tier 0 CERN Tier 1 Centres Brookhaven National Lab CNAF Bologna Fermilab FZK Karlsruhe IN2P3 Lyon Rutherford Appleton Lab (UK) University of Tokyo CERN Other Centres Academica Sinica (Taipei) Barcelona Caltech GSI Darmstadt Italian Tier 2s(Torino, Milano, Legnaro) Manno (Switzerland) Moscow State University NIKHEF Amsterdam Ohio Supercomputing Centre Sweden (NorduGrid) Tata Institute (India) Triumf (Canada) UCSD UK Tier 2s University of Florida– Gainesville University of Prague …… Confirmed Resources: http://cern.ch/lcg/peb/rc_resourceshttp://cern.ch/lcg/peb/rc_resources Centres taking part in the LCG prototype service : 2003 – 2005

6 CERN Ian.Bird@cern.ch6 LCG Resource Commitments – 1Q04 CPU (kSI2K) Disk TB Support FTE Tape TB CERN70016010.01000 Czech Republic6052.55 France4208110.2540 Germany207409.062 Holland12434.012 Italy5076016.0100 Japan220455.0100 Poland8695.028 Russia1203010.040 Taiwan220304.0120 Spain150304.0100 Sweden179402.040 Switzerland2652.040 UK178045524.0300 USA80117615.51741 Total56001169123.24228

7 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX7 LCG Security Group LCG Grid Deployment Board (GDB) –Regional centres and Experiments –Plan for deployment and operations GDB working groups – reported Feb 2003 –WG1 Middleware selection –WG2 Services and resource scheduling –WG3 Security –WG4 Operations –WG5 User Support WG3 reported that lots of work still to be done –LCG Security Group created – first meeting 9 April 03 Concentrating on the planning and implementation for start-up of LCG-1 (July 03) –But keep longer term in mind

8 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX8 Mandate To advise and make recommendations to the Grid Deployment Manager and the GDB on all matters related to LCG-1 Security –GDB makes the decisions To continue work on the mandate of GDB WG3 –Policies and procedures on Registration, Authentication, Authorization and Security To produce and maintain –Implementation Plan (first 3 months, then for 12 months) –Acceptable Use Policy/Usage Guidelines –LCG-1 Security Policy Where necessary recommend the creation of focussed task- forces made-up of appropriate experts –the “Security Contacts” group already working Led by Dane Skow, FNAL

9 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX9 Membership Experiment representatives/VO managers –Important to create the balance between functionality and security –Alberto Masoni, ALICE –Rich Baker, Anders Waananen, ATLAS –David Stickland, Greg Graham, CMS –Joel Closier, LHCb Site Security Officers –Denise Heagerty (CERN), Dane Skow (FNAL) Site/Resource Managers –Dave Kelsey (RAL) - Chair Security middleware experts/developers –Roberto Cecchini (INFN), Akos Frohner (CERN) LCG management and the CERN LCG team –Ian Bird, Ian Neilson, Markus Schulz Non-LHC experiments/Grids –Many sites also involved in other projects –Bob Cowles (SLAC) Still open to nominations of additional people

10 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX10 Grid security technology For LCG-1 start-up –Use what exists today Based on EDG release 2.0 Authentication (X.509 PKI) –List of trusted national CA’s –Online authentication: FNAL KCA, MyProxy Authorization –VO (LDAP) databases –Mkgridmap tool to create Grid mapfiles –Map to local user account (real or pool) AuthZ components: VOMS, LCAS/LCMAPS, US CMS VOX –Under development –See David Groep’s talk at this HEPiX –To be used when available, tested and proved Registration and VO management tools – under development

11 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX11 Policies and procedures All under consideration by GDB for approval in June Authentication - trusted CA’s Incident response Audit (and Accounting) User Rules/AUP/LCG Security Policy User Registration –Personal information –Procedures –Pre-registration and account creation VO Management Not discussed in detail (yet): –Firewalls (no big problems yet in LCG-0) –Outbound net connections from worker nodes?

12 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX12 Authentication - Trust Two main issues –Who defines the list of trusted CA’s? LCG or other Grid projects (EDG)? –How to introduce new types of CA (online)? E.g. Kerberos CA at FNAL LCG-1 and EDG Application testbed –closely linked (at many sites) –Common approach desirable (for this year) For 2003: proposed that GDB approves the list –EDG list plus additions –Require sites to install trusted list For Jan 2004 onwards –Forum for CA best practice and trust is evolving EGEE, GGF Community larger than just HEP

13 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX13 EDG CA’s 18 on the trusted list (today) Canada, CERN, Cyprus, Czech Republic, France, Germany, Greece, Ireland, Italy, Netherlands, Nordic, Poland, Portugal, Russia, Slovakia, Spain, UK, USA For EDG, CrossGrid, DataTAG, US projects… “Catch-all” operated today by CNRS/France Under development/consideration Belgium, FNAL (KCA), Hungary, Israel, Japan, Taiwan Next meeting of the CA group is 12/13 June (CERN)

14 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX14 Incident Response Draft document (Dane Skow) –being discussed on Security Contacts list –Incidents, communications, enforcement, escalation etc –working draft by end of May We already have a (mail) list of Contacts –these are people While no Grid Operations Centres –We need/will create an ops security list –Default site entry is the Contact person but an operational list would be better for Site Security Ops use only (not for users) Response will be no better than current cover –Varies from site to site –But not 24*7

15 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX15 Audit (and Accounting) LCG ops team defining lists of what logs need to be kept for audit purposes –Mainly grid services (CE etc) and batch services –Some grid service logs are distributed –Logs may also contain non-grid jobs (no problem) List to be finalised in June Format to be specified later (not July 2003) Tools to analyse and aggregate info will come later Propose minimum retention period is 3 months Some of the same logs will be needed for Accounting but this is not our responsibility

16 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX16 Acceptable Use Policy A single common policy to be agreed to/used by all –A big challenge! –Refers to the AUP/Rules of all sites –Only for professional Grid use Users agree to this when they join the LCG-1 VO We start with the current EDG User Rules –Aim to make minimal changes This includes User Rules, responsibilities of the Sites and rules for access to personal data Eventually we aim to have separate User Rules and a LCG Security Policy (but not for July) The AUP to be submitted to the GDB (end of May)

17 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX17 User Registration Personal Information The process for July 03 –User registers with the LCG-1 Reg. Web –This list of users (the LCG-1 Guidelines VO) starts from an empty list (no inherited users) –User requests membership of a VO –Registration will have an initial short expiry date Propose 6 months (2004 – new AUP/Policy, new procedures) –Information collected (fields on the web form) is ideally the super-set of that required by the sites But this almost certainly not possible Aims –Avoid user having to register at multiple sites –Avoid situation where users jobs will only run at subset of sites (but technically possible)

18 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX18 User personal info (2) Current common list (discussed on Security Contacts list) –Full name, Institute, telephone number, e-mail address, Certificate DN, Experiment OK so far, but some sites have requirements for additional fields Some US sites, for example, require –Nationality, date of birth and place of birth –Info required up-front for pre-registration These items raise significant privacy concerns –Can be used for Identity theft –Users rightly concerned about the distribution/use of their data

19 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX19 User personal info (3) GDB expressed strong concerns about the distribution of and access to the data (privacy and legal issues) –Very unlikely to divulge personal info held by them Even after an incident Reg. web will request the user’s consent to use the personal data We need LCG policy in this area –Who has access to the data and for what purpose? GDB sites considering the requirements –Can policy be changed? At least in the short-term (or look at exceptions) –Avoid pre-registration of the users wherever possible –Aim to minimise and standardise the info collected –But may have to cope with diversity in the future

20 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX20 Registration procedures We need a robust process for checking –The right of the user to join LCG-1 –That (s)he issued the request to join To enable sites to open resources to the users –Without pre-registration Long-term aim –move the registration process to the Experiment Secretariats/User offices Short-term –checks at the first stage in the registration process joining the LCG-1 Guidelines VO This is where the user info is collected and stored –Working with experiments to improve the existing rudimentary checks done by many VO managers

21 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX21 VO Management Strong message from the experiments –One VO service per experiment –shared between LCG and EDG July 2003 –Use existing VO databases and servers run by NIKHEF (for LHC in EDG) –With existing VO managers These check and approve the requests to join With new-improved robust process By Jan 2004 (or earlier?) –LCG will need to run its own servers

22 20-May-03D.P.Kelsey, LCG-1 Security, HEPiX22 Summary Security is one of the big challenges for LCG-1 We are working hard to agree policy and procedures for start-up in July 2003 –But also planning for next year and beyond Looking forward to the new AuthZ technology –Groups, roles, fine-grained access control, etc Questions, comments?


Download ppt "20-May-03D.P.Kelsey, LCG-1 Security, HEPiX1 Grid Security for LCG-1 HEPiX, NIKHEF, 20 May 2003 David Kelsey CCLRC/RAL, UK"

Similar presentations


Ads by Google