CNIC Grid CA/SDG CA Self Audit Kejun (Kevin) Dong Computer Network Information Center (CNIC) Chinese Academy of Sciences APGridPMA F2F.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

APGrid PMA Face-to-Face Meeting NCHC CA Weicheng Huang National Center for High-performance Computing April 8, 2008.
CNIC Grid/SDG CA Updates 2 nd APGrid PMA meeting, October 15, 2006 Morrise Xu NTARL, CNIC, China.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Yuan, Tein Horng Academia Sinica Computing Centre 13 June 2003.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Jinny Chien.
1 ASGCCA Self-Audit Report APGridPMA Jinny Chien March
1 REUNA Certificate Authority Juan Carlos Martínez REUNA Chile Rio de Janeiro,27/03/2006, F2F meeting, TAGPMA.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
HEBCA – Higher Education Bridge Certification Authority Presented by Scott Rea and Mark Franklin, Fed/Ed Meeting, 12/14/2005.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Jinny Chien F2F Meeting 8 th March 2010.
UNAMgrid CA Juan Carlos Guel UNAM, México. Alejandro Núñez UNAM, México. Israel Becerril UNAM, México. DGSCA UNAM 31/08/06.
NECTEC-GOC CA APGrid PMA face-to-face meeting. October, Sornthep Vannarat National Electronics and Computer Technology Center, Thailand.
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
DataGrid WP6 CA meeting, CERN, 12 December 2002 IISAS Certification Authority Jan Astalos Department of Parallel and Distributed Computing Institute of.
DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT By Alexander Beck Jens Graupmann Frank Ortmeier.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
IHEP Grid CA Status Report Gongxing Sun F2F Meeting 20 Apr Computing Centre, IHEP,CAS,China.
IHEP Grid CA Status Report Wei F2F Meeting 8 Mar Computing Centre, IHEP,CAS,China.
User Certificate Application: ASGCCA. Agenda Introduction ASGCCA User Responsibilities Certificate application form RA verify identity of users User generate.
IHEP Grid CA Status Report Gongxing Sun 5 th F2F Meeting 16 Sep Computer Center, IHEP,CAS,China.
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
Academia Sinica Grid Computing Certification Authority (ASGCCA)
KFKI RMKI CA Review EUGridPMA May 26-28, Copenhagen Szabolcs Hernáth MTA KFKI RMKI pki.kfki.hu.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
KISTI Grid CA Operation KISTI Supercomputing Center Sangwan Kim, Soonwook Hwang CA Operators Contact: Jan. 8, 2007.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Jinny Chien.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Jinny Chien April 20, th APGridPMA in Taipei.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
KEK GRID CA updates Takashi Sasaki Computing Research Center KEK.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
APGrid PMA face-to-face meeting, 9/16/2008 PRAGMA-UCSD CA Team Pacific Rim Application and Grid Middleware Assembly
0 NAREGI CA Status Report APGrid F2F meeting in Singapore June 4, 2007 Rumiko Masuko.
KEK GRID CA Takashi Sasaki Computing Research Center KEK.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
HPC Team 1 HKU CA Status Report 5th F2F meeting, Sep. 16, 2008 Frankie Cheung Computer Centre The University of Hong Kong.
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America The Latin American Catch-all Grid Certification.
NIIF CA Status Update and Self-Audit Results 15 th EUGridPMA meeting Nicosia Tamás Máray NIIF Institute.
Baltic Grid Certification Authority 15th EUGridPMA, January 28th 2009, Nicosia1 Self-audit Hardi Teder EENet.
PKI for improved cybersecurity in NATO Partner countries Software Arsen Hayrapetyan, ArmeSFo CA.
TR-GRID CA Self-Auditing Results and Status Update EUGridPMA Meeting September 12-14, 2011 Marrakesh Feyza Eryol, Onur Temizsoylu TUBITAK-ULAKBIM
HKU Computer Centre Grid Certificate Authority Status Update Lilian Chan IT Services, The University of Hong Kong APGrid.
BG.ACAD CA HTTP :// CA. ACAD. BG S ELF - AUDIT REPORT 2014 Vladimir Dimitrov IICT-BAS ( 32 nd EUGridPMA Meeting Poznan, 8-10.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
NECTEC-GOC CA A Brief Status Report 13 th APGrid PMA Face-to-Face meeting March 24 th, 2014 Large-Scale Simulation Research Laboratory Information Communications.
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
Armenian e-Science Foundation Certification Authority Ara A. Grigoryan 1,2, Artem Harutyunyan 1,2,3, Arsen Hayrapetyan 1,2,4 1 Armenian e-Science Foundation;
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
IHEP Grid CA Status Report F2F Meeting 17 Mar Computing Centre, IHEP,CAS,China.
Self-Audit & Status Report for KEK GRID CA Hiroyuki Matsunaga KEK (High Energy Accelerator Research Organization), Computing Research Center APGridPMA.
PKGrid CA Self-Audit 2012 Adeel-ur-Rehman Mansoor Sheikh.
IRAN-GRID CA Self Audit IRAN-GRID CA Self Audit Report Shahin Rouhani IRAN-GRID Tehran Iran Shahin Rouhani Grid Computation Group IPM, Tehran, Iran May.
AEGIS Certification Authority
UGRID CA Sergii Stirenko, Oleg Alienin
Guidelines for auditing Grid CAs
MaGrid CA Self audit and update
Emir Imamagić University Computing Centre (Srce)
Bill Yau HKU Grid Certificate Authority (HKU Grid CA) Self Audit & Status Report Bill Yau
MyIFAM CA Self-Audit Report APGridPMA F2F Meeting 1/4/2019
KISTI CA Report Status & Self-Audit
BG.ACAD CA Self-audit report 2018
Presentation transcript:

CNIC Grid CA/SDG CA Self Audit Kejun (Kevin) Dong Computer Network Information Center (CNIC) Chinese Academy of Sciences APGridPMA F2F ASGC March 08, 2010

Overview CNIC Grid CA/SDG CA Self Audit Conclusion

CNIC Grid CA CNIC is an institute of CASCNIC is an institute of CAS CNIC Grid CACNIC Grid CA –The security infrastructure of CNIC Grid –Root CA CNIC Grid CA RepositoryCNIC Grid CA Repository – –CP/CPS –Introduction –Manual CA CertificateCA Certificate –20 years validity –Only issues sub-CA certificate and CA servers and operators certificates

SDG CA Scientific Data Grid (SDG)Scientific Data Grid (SDG) –Scientific Data Grid (SDG) is an application grid based on scientific data resources sharing and collaboration. SDG CASDG CA –the SDG security infrastructure –The subordinate CA of CNIC Grid CA SDG CA Repository CP/CPSSDG CA Repository CP/CPS – –CP/CPS –Introduction –Manual SDG CA CertificateSDG CA Certificate –20 years validity Type of certificatesType of certificates –Person –Host –Service Approved by APGridPMA in July 2006

CNIC Grid/SDG CA staff operators Kevin Dong Kai Nan Kevin Dong Yihua Zheng Yueda Wang Huabiao Li All staff Administrator: Kevin Dong

Hardware CA serverCA server –DELL GX620 P4 CPU 3.20GHz, Red Hat Linux AS4 –Offline, no connection to any other network –UPS is supplied RA serverRA server –DELL GX620 P4 CPU 3.20GHz, Red Hat Linux AS4 –connected to the Internet Only the necessary ports for RA operation are opened. Other ports are filtered by the firewall. –UPS is supplied Web server (repository)Web server (repository) –The same machine as RA Server –connected to the Internet Same as RA Server –UPS is supplied

Sofeware OpenCA CertUtitily Tool –Generate CSR

Physical Access CA roomCA room –Located in the CNIC machine room. –Limited person can enter. Security OfficerSecurity Officer CA OperatorsCA Operators Other CNIC administratorsOther CNIC administrators –Doors equipped with fingerprint recognition system. –Monitored by the CCTV Physical accessPhysical access –The CA operator is not allowed to access the CA machines alone and need to do so with the other CA operator. –If the CA operator needs to access the CA machines alone, he must notify the fact to the user administrator by s before and after entering the room. –All events about the access to the machines must be recorded in the paper sheets prepared in the room. The events include the names of CA operators, date and time of entering/leaving the room, and the purpose of the access to the machine. –The filled sheets will be kept in the dedicated safe box.

1. Generate keypair and CSR locally and upload the CSR to RA or Fill the form and generate CSR automatically and send to RA(web page)RA 2. Identified by in- person interview or official document User Admin. CA Operator 3. Instruct CA operators to accept the request RA server CA server 7. Copy the CSR to CA server 8. Issue the certificate with proper validity 9. Copy the certificate to USB key 12. Send successful issuing mail and CRIN mail 4. Approve the CSR 5. Copy the CSR to USB disk 6. Give the USB key to other CA operator 10. Copy the certificate to RA server 11. Publish the certificate User Workflow of Issuing Certificates

Current status of SDG CA Number of issued certificatesNumber of issued certificates –by Mar. 07, Total User Certificate Service Certificate Host Certificate Total

Current status of SDG CA by Mar. 07, 2010)Current Status (by Mar. 07, 2010) Valid Certificate50 Expired Certificate199 Revoked Certificate30 Total279

Current status of CNIC Grid CA Number of issued certificatesNumber of issued certificates –by Mar. 07, Total Sub-CA Certificate Host Certificate Total211105

Current status of CNIC Grid CA Valid Certificate2 Expired Certificate3 Revoked Certificate0 Total5 by Mar. 07, 2010)Current Status (by Mar. 07, 2010)

Self Audit SDG CA –CP/CPS 1.8->1.9 –CRL Profile 1.3->1.4 CNIC Grid CA –CP/CPS 1.4->1.5 –CRL Profile 1.2->1.3 AuditingSpreadsheet.xls –IGTF classic profile: IGTF-AP-classic-4-2 –Special thanks to Yoshio

Summary Marks –A: 66 –B: 3 –C: 2 –D: 0

RA - (4) RA should ensure that the requester is appropriately authorized by the owner of the associated FQDN or the responsible administrator of the machine to use the FQDN identifiers asserted in the certificate. –In section 4.3.1, the role to ensure the FQDN will be defined in CP/CPS. –B

RA - (6) The CA or RA should have documented evidence on retaining the same identity over time. –It is obvious that the DN is unique for a person because the or FQDN is included. Now it is defined in section –C

CA - (16) The on-line CA architecture must provide for a log of issued certificates and revocations. The log should be tamper- protected. –The logs are available and archived. We will make logs tamper-protected. –C

CA - (27),(32) The authority must publish CRLs, and these CRLs should be compliant with RFC5280. –In section 2 and section 4.9.8, "the repository of certificates and CRLs are available at though RFC 5280 is not explicitly defined in CP/CPS. The RFC 5280 will be defined in the CP/CPS. –B

CA - (45) Identity validation records must be kept at least as long as there are valid certificates based on such a validation. –The identity validation records are kept at least as long as there are valid certificates based on such a validation. But it is not mentioned in CP/CPS. We will add in section –B

Conclusion Positive Update of CP/CPS and CRL profile –Done –Release soon

Thanks!