APGrid PMA Face-to-Face Meeting NCHC CA Weicheng Huang National Center for High-performance Computing April 8, 2008.

Slides:



Advertisements
Similar presentations
Updates of the APGrid PMA Catania March 3, 2009 Yoshio Tanaka APGridPMA Chair, AIST, Japan.
Advertisements

RPKI Certificate Policy Status Update Stephen Kent.
Digital Certificate Installation & User Guide For Class-2 Certificates.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Academia Sinica Grid Computing Certification Authority (ASGCCA) Yuan, Tein Horng Academia Sinica Computing Centre 13 June 2003.
CNIC Grid CA/SDG CA Self Audit Kejun (Kevin) Dong Computer Network Information Center (CNIC) Chinese Academy of Sciences APGridPMA F2F.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Federation of Campus PKI and Grid PKI for Academic GOC Management Conformable to APGrid PMA National Institute of Informatics, JAPAN Toshiyuki Kataoka,
1 REUNA Certificate Authority Juan Carlos Martínez REUNA Chile Rio de Janeiro,27/03/2006, F2F meeting, TAGPMA.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
11 CERTIFICATE SERVICES AND SECURE AUTHENTICATION Chapter 10.
Computing Research Center, High Energy Accelerator Organization (KEK) KEK Grid CA Go Iwai The 2 nd APGrid PMA Meeting at Osaka Univ.
NECTEC-GOC CA APGrid PMA face-to-face meeting. October, Sornthep Vannarat National Electronics and Computer Technology Center, Thailand.
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
NAREGI CA Updates Kento Aida NAREGI CA/NII Kento Aida, National Institute of Informatics APGrid PMA meeting 04/20/2008.
DataGrid WP6 CA meeting, CERN, 12 December 2002 IISAS Certification Authority Jan Astalos Department of Parallel and Distributed Computing Institute of.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
Introduction of NAREGI-CA National Institute of Informatics JAPAN Toshiyuki Kataoka, July 19, 2006 APAN Grid-Middleware Workshop, Singapore.
IHEP Grid CA Status Report Gongxing Sun F2F Meeting 20 Apr Computing Centre, IHEP,CAS,China.
IHEP Grid CA Status Report Wei F2F Meeting 8 Mar Computing Centre, IHEP,CAS,China.
User Certificate Application: ASGCCA. Agenda Introduction ASGCCA User Responsibilities Certificate application form RA verify identity of users User generate.
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
UNAMgrid Alejandro Núñez Sandoval Rio de Janeiro, Brazil, 03/27/06 F2F meeting, TAGPMA.
KISTI Grid CA Status Report Korea Institute of Science and Technology Information Sangwan Kim Jae-Hyuck Kwan
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
Academia Sinica Grid Computing Certification Authority (ASGCCA)
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
KISTI Grid CA Operation KISTI Supercomputing Center Sangwan Kim, Soonwook Hwang CA Operators Contact: Jan. 8, 2007.
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
KEK GRID CA updates Takashi Sasaki Computing Research Center KEK.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
APGrid PMA face-to-face meeting, 9/16/2008 PRAGMA-UCSD CA Team Pacific Rim Application and Grid Middleware Assembly
0 NAREGI CA Status Report APGrid F2F meeting in Singapore June 4, 2007 Rumiko Masuko.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
Baltic Grid Certification Authority 15th EUGridPMA, January 28th 2009, Nicosia1 Self-audit Hardi Teder EENet.
TR-GRID CA Self-Auditing Results and Status Update EUGridPMA Meeting September 12-14, 2011 Marrakesh Feyza Eryol, Onur Temizsoylu TUBITAK-ULAKBIM
HKU Computer Centre Grid Certificate Authority Status Update Lilian Chan IT Services, The University of Hong Kong APGrid.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
NECTEC-GOC CA A Brief Status Report 13 th APGrid PMA Face-to-Face meeting March 24 th, 2014 Large-Scale Simulation Research Laboratory Information Communications.
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
Armenian e-Science Foundation Certification Authority Ara A. Grigoryan 1,2, Artem Harutyunyan 1,2,3, Arsen Hayrapetyan 1,2,4 1 Armenian e-Science Foundation;
TNGrid CA 24 th EUGridPMA meeting Ljubljana, Slovenia, January, 2012 Heithem ABBES Mohamed JEMNI
IRAN-GRID Certificate Authority 13 th EUgridPMA Meeting Copenhagen May 2008 Majid Arabgol Hessamdding Arfaei Shahin Rouhani
IRAN-GRID CA Self Audit IRAN-GRID CA Self Audit Report Shahin Rouhani IRAN-GRID Tehran Iran Shahin Rouhani Grid Computation Group IPM, Tehran, Iran May.
AEGIS Certification Authority
UGRID CA Sergii Stirenko, Oleg Alienin
Guidelines for auditing Grid CAs
جايگاه گواهی ديجيتالی در ايران
MaGrid CA Self audit and update
NATIONAL CENTRE FOR PHYSICS PK-Grid-CA
Bill Yau HKU Grid Certificate Authority (HKU Grid CA) Self Audit & Status Report Bill Yau
MyIFAM CA Self-Audit Report APGridPMA F2F Meeting 1/4/2019
KISTI CA Report Status & Self-Audit
BG.ACAD CA Self-audit report 2018
Presentation transcript:

APGrid PMA Face-to-Face Meeting NCHC CA Weicheng Huang National Center for High-performance Computing April 8, 2008

Introduction – NCHC National Center for High-performance Computing Government supported research institute under NARL NARL : National Applied Research Laboratories government supported non-profit organization Funded by National Science Council (NSC) Currently, there are 3 sites Resource distributed Management coordinated Suitable for Grid environment ISO9001, ISO27001

Security - Physical Security (ISO & 9001) ‏

Introduction – NCHC The only national supercomputing center in Taiwan Responsible for Taiwan’s cyberinfrastructure Providing services to whole academia and research community in Taiwan Resources/Services Supercomputing Including Grid Computing Storage/archiving Advanced network Information technology

NCHC Grid Application Computing Grid Eco-Grid Geo-Grid Flood Mitigation Grid Sensor Network Co-Life/e-learning/Access Grid Medical Grid Applications

NCHC CA Organization NCHC Certificate Authority NCHC CA PMA: Policy Management Authority CA Manager: Manage all CA tasks Manage CA private key and its copy Approve CA and RA operator to operate affairs RA Operator: Accept subscribing request Verify subscribers' information CA Operator: Operate/maintain The CA signing server The CA web server Operate CA tasks

CP/CPS Current version:1.1.0 (April, 2008) ‏ Object ID: Conform to RFC 3647 Managed by the NCHC PMA Major changes Approved by the APGrid PMA community Minor changes Approved by the NCHC CA PMA Notify APGrid PMA via mail

End Entities NCHC CA issues certificates for the following Users Users of NCHC Users of NARL Users/services involved in KING and TWAREN KING : Knowledge Innovation National Grid TWAREN : TaiWan Advanced Research and Education Network Users of domestic Grid-based applications or projects Collaborators related to NCHC Grid Computing research Users/services involving NCHC’s Grid Computing Resources

Publication and Repositories Repositories NCHC CA certificate Certificates issued by NCHC CA Certificate Revocation List (CRL) signed by NCHC CA Copy of CP/CPS

Publication and Repositories Publication Client certificate information used for Grid map file CA certificate CA certificate fingerprint CRL issued by NCHC CA Copy of CP/CPS Access control Online, 24x7 availability Subjected to reasonable scheduled maintenance

Certificate Event - Certificate Type Issuer C=TW, O=NCHC, OU=GOC, CN=NCHC CA User DN C=TW, O=[applicant's org], OU=[applicant's unit], CN=[the name of applicant with serial] Ex : /C=tw/O=nchc/OU=gtd/CN=Wei-Yu Chen Host DN C=TW, O=[applicant's org], OU=[applicant's unit], CN=[FQDN of the hostname] Ex: /C=tw/O=nchc/OU=gtd/CN=fs01.nchc.org.tw

Certificate Event - Issuing Procedure (1) ‏ 1. Fill out the web enrollment form 2. Send a activate mail 3. Click the activate link to activate 4. Inform RA OP 5. Interview applicant 6. Approve the applicant data Web Server (RA server) ‏ Applicant RA OP

Certificate Event - Issuing Procedure (2) ‏ 8. Login and upload CSR file according mail 7. Mail applicant include ( LicenseID, CSR-upload- website, CSR-creation-help ) ‏ 9. Checkout then Inform CA OP 10. Copy the CSR file through USB 11. Sign it 12. Approval from CA Manager 13. Copy to RA server then publish information on web 14. Send successful issuing mail to applicant Applicant CA OP & CA server Web Server (RA server) ‏

Certificate event -- Validity User certificate Activate address to avoid mis-spelling or stuffing attack Supply applicant configure file to create the correct CSR Compare with the contents of CSR and enrollment data Host certificate Verify if the applicant is a subscriber of user certificate Create and check CSR in the same way as user certificate

Certificate event -- Identification User certificate Applicant from NCHC RA check the badge ID of the applicant Applicant from other organization RA check personal information of the applicant Interview Host certificate RA approve the subscriber’s title of the host FQDN

Certificate Revocation/Suspension 16 When to revoke? When there is suspected security problems Compromise of subscriber's private key Incorrectness of subscriber’s information Subscriber violate obligation which might cause security problem Subscriber leaves his/her organization Host/service is retired Who can request revocation Any other entity presenting evidence of circumstances that the criteria described in section has been violated Any entities presenting evidence of the compromise of associated private key

Certificate Revocation/Suspension 17 Procedure of revocation Subscriber send a revocation request to NCHC CA RA should authenticate the subscriber as described previously RA forwards revocation request to CA CA will Revoke the certificate Update the signed CRL in NCHC CA publication Send revocation notice to subscriber Time frame CA should process ASAP, w/o grace period CA processing time is 1 working day

Certificate Revocation/Suspension 18 CRL (Certificate Revocation List) Valid for 30 days New CRL issued 7 days before expiration of current CRL Immediately after a certification revocation Certificate Lifetime End entity certificate 1 year CA certificate 10 years

End of Subscription 19 Subscriber Must not use any certificate issued from NCHC CA CA Must revoked all certificates issued for the subscriber

CA/RA System Information CA serverWeb Server/RA server HardwareHP DX 7200 SystemUbuntu 7.10 NetworkOff-lineOn-line (w/firewall) UPS (battery + generator)Suppliedsupplied ACSuppliedsupplied

Physical Security Entrance guards and security door 1

Physical Security Security door 2 Cabinet w/key

Physical Security Machine OP monitored NOC monitored ISO 9001 Operation of machine room Operation of data storage NCHC internal auditing, at least, once per year External auditing, once per year ISO Information security NCHC internal auditing, at least, once per year External auditing, once per year

Key Pair and Certificate Usage 24 Key length CA Certificate : 2048 bits End Entity Certificate : 1024 bits sha1WithRSAEncryption CA private key generated by CA operator Using OpenSSL User and Grid Host key pair generated by user Using OpelSSL

Key Pair and Certificate Usage 25 NCHC CA certificates may be used for any software for grid computing. The certificates could be used in other capacities, but not recommend and no warranty User certificates must not be shared Host certificates must be linked to a single network entity The subscriber must manage his certificates and private keys securely must encrypt his private with a pass phrase the pass phrase must not be less than 12 characters long.

Certificate Management 26 Renewal Do not permit Re-key Revoke first, then, regenerate Modification Not supported

Records Archival Types of archive data: All certificates and the CRLs All enrollments or revocations, including all supporting documents, submitted by users All records related to the CA key All auditing records This CPS and operational procedures documents Other important materials related to decisions of the NCHC PMA Retention period is 3 years Archived files are stored in CD-ROM which is stored in a safe box.

Internal Auditing First Auditing 2008/1/25 Refine CA procedure Based on checklist provided of APGrid PMA Second Auditing 2008/3/17 Check overall procedure Conform to checklist provided of APGrid PMA

Internal Auditing First internal auditing 2008/01/25 Procedure refinement Based on checklist provided by APGrid PMA Enhancement identified/improved Second internal auditing 2008/03/17 Reconfirm overall procedure Conform to checklist provided by APGrid PMA