Password? CLASP Project Update C5 Meeting, 16 June 2000 Denise Heagerty, IT/IS.

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
SCSC 455 Computer Security
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
MyProxy: A Multi-Purpose Grid Authentication Service
Access Control Chapter 3 Part 3 Pages 209 to 227.
Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
1 Lecture 12: Kerberos terms and configuration phases –logging to network –accessing remote server replicated KDC multiple realms message privacy and integrity.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Password?. Project CLASP: Common Login and Access rights across Services Plan
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Password?. Project CLASP: Common Login and Access rights across Services Plan
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
Active Directory: Final Solution to Enterprise System Integration
Password? CLASP Phase 2: Revised Proposal C5 Meeting, 16 February 2001 Denise Heagerty, IT/IS.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
HEPNT/HEPiX meeting Oct 6, Securing mail access with Kerberos and SSL Wolfgang Friebel DESY.
X.509 at the University of Michigan CIC-RPG Meeting June 7, 1999 Kevin Coffman Bill Doster
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
CERN’s Computer Security Challenge
KX509: Leveraging Kerberos to Obtain Digital Certificates for Web Client Authentication University of Michigan Kevin Coffman Bill Doster.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Windows NT ® Single Sign On Cross Platform Applications (Part II) John Brezak Program Manager Windows NT Security Microsoft Corporation.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Password? CLASP Project FOCUS Meeting, 12 October 2000 Denise Heagerty, IT/IS.
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
File sharing requirements of remote users G. Bagliesi INFN - Pisa EP Forum on File Sharing 18/6/2001.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Web Services Security Patterns Alex Mackman CM Group Ltd
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
JLAB Password Security Ian Bird Jefferson Lab HEPiX-SLAC 6 Oct 1999.
Password? CLASP Phase 2: Revised Proposal FOCUS, 3 May 2001 Denise Heagerty, IT/IS.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Project CLASP: Common Login and Access rights across Services Plan Goal  Propose a detailed plan to reduce the number of login/passwords entered by users.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
The Umbrella Project Authentication The minimum user information possible is stored centrally to avoid Data Protection issues. The Authentication is done.
Radius, LDAP, Radius used in Authenticating Users
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Computer Security Distributed System Security
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
Presentation transcript:

Password? CLASP Project Update C5 Meeting, 16 June 2000 Denise Heagerty, IT/IS

Outline  CLASP purpose and phase 1 Goals  Service survey results  Kerberos feasibility results  Integration with GRID applications  Smart cards  Security and Off-site considerations  Common Access Rights  Kerberos v5 Advantages Summary  Next Steps

Project CLASP Purpose For users both on and off the CERN site:  Investigate and propose a plan for implementing a common authentication mechanism for use by CERN services.  Investigate and propose a platform independent mechanism to provide controlled access to objects (e.g. systems, files, web pages) for authenticated users.

Phase 1 Goals  Document the current login/password mechanisms used on IT and AS services  Assess the feasibility of Kerberos v5 and/or other technology as a common authentication mechanism for the planned Windows 2000 & Linux 2000 environments  Investigate possibilities for platform independent access control  Propose next steps, including personnel and budget estimates

Service Survey Results  Service Survey at  Survey lists more than 30 different user services in IT, AS, EST, SL and ST Division using more than 12 different passwords  Most IT services use a common loginid centrally managed in CCDB AS Division integration is in progress  There is some password harmonisation: AFS, AIS, CADIM, MAIL, NICE  The explosion of different loginid/password pairs is mainly driven by web authors

Kerberos v5 Availablility  Kerberos v5 is available in both W2000 and Linux RH v6.2 KDC, libraries, some applications  AFS (Kerberos v4) requires a UNIX KDC MIT KDC + AFS extensions exist in public domain  W2000 requires a W2000 KDC Microsoft Kerberos includes security data  A complete solution requires separate KDCs with synchronised passwords documented by Cybersafe and Microsoft uses cross-realm authentication between the UNIX and W2000 KDCs

Kerberos Realms Common Database KDC1KDC2 W2000 Realm Linux Realm UNIX clients and servers W2000 clients and servers

Applications Survey  Single Sign On requires Kerberos interfaces in both client and server applications Defined by RFC2078: GSS-API (W2000 uses SSPI) Kerberized initial login is not enough for SSO  A CERN applications survey is in progress covers software in use today and Kerberos availability  Availability of Kerberized applications is limited, but popularity is growing Influenced by changes in US encryption exportation laws and adoption of Kerberos by Microsoft?

Kerberized applications  Mail IMAP server (U of Washington) - Yes! Outlook and Pine - Yes! Netscape - ?  Interactive Commands telnet, ftp, rcp, rlogin: UNIX - Yes! / W ? X, Xlock: Exceed - No / Others - ?  File Access AFS - Yes (via Kerberos v4 extension on UNIX KDC) Microsoft NTFS: W Yes!  Directory access LDAP and Active Directory - Yes!

Kerberized Web  A web server accesses web pages on behalf of the client  For protected pages, web server proposes authentication schemes to the client  No general solution for Kerberos v5  A Kerberos v5 solution is documented for Internet Explorer based on a server plug-in documented in a White Paper by Cybersafe web server can be UNIX (GSS-API) plug-in uses client forwarded TGT to act on its behalf needs further investigation

Integrating GRID Applications  Globus GRID security is based on PKI PKI = Public Key Infrastructure Public Key kept in an X.509 certificate  PKI does not provide Single Sign On private key is protected by a password/PIN code  Globus have implemented User Proxy Certificates to achieve Single Sign On your proxy private key is protected by the file system proxy certificates work in the Globus environment  Globus provide SSO between Kerberos v5 and Proxy Certificates can generate a proxy certificate from a Kerberos TGT

Smart Cards  Can store a user certificate and private key protected by a PIN code, normally requested each time the certificate is used Could be combined with new CERN physical access cards (at extra cost for the chip and writer) UBS smart card could be used for CERN authentication Globus works with Netscape on a PC (PKCS#11)  Card readers connect to serial or USB ports  Integrates with Kerberos v5 and Globus SSO  Early technology - compatibility problems  Not a general solution for off-site access requires card readers at all remote sites and systems

Security Considerations  Security of Single Sign On depends heavily on protection of the initial password  A kerberized initial login on a local W2000 or Linux system will not expose the user password on the network  A kerberized initial login across the network can expose a password Unencrypted sessions: e.g. X Windows, telnet, …  Network logins require additional security mechanisms to avoid exposing valid passwords - particularly off-site access

Off Site Access  We need to review off-site access to CERN Password sniffing is a serious and growing problem FNAL are adopting One Time Passwords using crypto cards combined with Kerberos v5 and SSO Other sites enforce ssh, but this only reduces network sniffing - user can still expose a password  Solutions for portables should be possible can be configured as if at CERN  Kerberos v5 (cross-realm) with trusted sites authenticate at remote site - no password at CERN  Need a general solution for other sites

Common Access Rights  Key/Initial applications: distribution lists web page protection file protections  Concept of “e-groups” looks useful electronic grouping of people/accounts defined centrally and made available to applications LDAP / Active Directory play a key role work is in progress

Kerberos v5 Advantages Summary  Common authentication technology across W2000 and UNIX platforms can focus expertise on a single protocol  A basis for cross-platform Single Sign On Requires kerberized applications  Allows authentication agreements with trusted remote sites cross-realm tests discussed with FNAL  Integrates with GRID Single Sign On Proxy certificates generated from Kerberos TGTs  Integrates with PKI PKINIT: from a certificate you can obtain a TGT

Conclusion  Kerberos v5 provides a good basis for common authentication and Single Sign On infrastructure available in W2000 and Linux RH v6.2 standard application interfaces (RFC 2078, MS-SSPI)  Some PKI (Public Key Infrastructure) is required for GRID applications Can be integrated with Kerberos v5 Single Sign On  Enhanced security is essential to overcome the vulnerability of the initial sign on  We need to control the explosion of web loginid/password pairs may need to consider non-Kerberos solutions

Next Steps: until Sep 2000  Continue testing: Kerberised mail, web, oracle applications cross-realm authentication GRID authentication and Kerberos integration  Collect feedback from the service providers cost/benefit analysis availability of resources for detailed planning  Prepare a proposal for CLASP Phase 2 Present proposal to an open C5 meeting before next FOCUS meeting (12 Oct 2000)

Password? CLASP studies have been made in collaboration with many colleagues both inside and outside IT Division - Thanks!