Updates from the EUGridPMA David Groep, March 15 th, 2010.

Slides:



Advertisements
Similar presentations
Updates from the EUGridPMA David Groep, March 8 th, 2010.
Advertisements

1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
IGTF and SHA-2 David Kelsey TAGPMA meeting, SDSC Feb 2012.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Authorization WG Update David Kelsey EU Grid PMA, Copenhagen 27 May 2008.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
National Center for Supercomputing Applications MyProxy and GSISSH Update Von Welch National Center for Supercomputing Applications University of Illinois.
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Policy Issues for Identity Management (and other attributes) EGI Technical.
Updates from the EUGridPMA David Groep, June 22 nd, 2010.
Updates from the EUGridPMA David Groep, Apr 20 th, 2009.
WebFTS as a first WLCG/HEP FIM pilot
Updates from the EUGridPMA David Groep, Oct 11 th, 2011.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Updates from the EUGridPMA David Groep, Apr 8 nd, 2008.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The CA Distribution Process David Groep, July 2007.
Unit 1: Protection and Security for Grid Computing Part 2
Networks ∙ Services ∙ People David Groep TCS TNC2015 Workshop TCS SAML demo background June 16, 2015 TCS PMA.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
TERENA TF-EMC2 Workshop David Groep,
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
EUGridPMA Status, current trends and some technical topics March 2013 Boulder, CO, USA David Groep, Nikhef & EUGridPMA.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
Updates from the EUGridPMA David Groep, Nov 7 nd, 2008.
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
European Grid Policy Management Authority. Event - 2/total Speaker Name – Coverage of the EUGridPMA Green: Countries with an accredited.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
EUGridPMA Status, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
Distribution Repository Structure David Groep,
Discussions on the Life Ray Portal and credential management David Groep, Oct 11 th, 2011.
EGI-InSPIRE RI EGI.eu European Grid Infrastructure EGI-InSPIRE RI Credential Validation Middleware Requests compiling.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
Updates from the EUGridPMA David Groep, May 9 st, 2007.
Status review and pending issues March 13, 2012 Oxford, UK David Groep, Nikhef, EUGridPMA, EGI and BiG Grid participation supported by IGE, the Initiative.
Updates from the European Side of the Pond David Groep, November 2006.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
TACAR Updates version David Groep, NIKHEF. 9 th EUGridPMA ‘RAL’ meeting – Jan David Groep – TACAR Aims  Trusted and.
LAB#8 PKI & DIGITAL CERTIFICATE CPIT 425. Public Key Infrastructure PKI 2  Public key infrastructure is the term used to describe the laws, policies,
NIIF CA Status Update and Self-Audit Results 15 th EUGridPMA meeting Nicosia Tamás Máray NIIF Institute.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
Welcome to Amsterdam EUGridPMA35 September EUGridPMA Amsterdam 2015 meeting – 2 David Groep – Welcome back in Amsterdam.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Maria Alandes Pradillo, CERN Training on GLUE 2 information validation EGI Technical Forum September 2013.
Updates from the EUGridPMA David Groep, Oct 17 st, 2007.
IGTF Risk Assessment Team 5/11/091.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
Classic X.509 AP updates (v4.1)
EUGridPMA CAOPS-WG and IGTF Issues March 2013 Charlottesville, VA, USA David Groep, Nikhef, EUGridPMA, and EGI.
HellasGrid CA & euGridPMA
EUGridPMA Status and Current Trends and some IGTF topics March 2016 Taipei, TW David Groep, Nikhef & EUGridPMA.
EUGridPMA Status and Current Trends and some IGTF topics March 2018 APGridPMA ISGC Meeting David Groep, Nikhef & EUGridPMA.
Presentation transcript:

Updates from the EUGridPMA David Groep, March 15 th, 2010

OGF28 CAOPS/IGTF – Mar David Groep – Updates from the EUGridPMA  Towards even more EMEA coverage  Novel CA architectures  Federation-backed SLCS and MICS CAs  Auditing progress  Authorization Operations WG  Distribution and fetch-crl  OpenSSL 1and distribution format change

OGF28 CAOPS/IGTF – Mar David Groep – Common Guidelines across the IGTF

OGF28 CAOPS/IGTF – Mar David Groep – New CAs: the Accreditation Process Accreditation Guidelines for EUGridPMA Basic elements:  Codification of procedures in a CP(S) for each CA  Based on standard RFC templates  Peer-review process for evaluation  comments welcomed from all PMA members  two assigned referees for in-depth evaluation  In-person appearance during a review meeting + 1/yr  Accreditation after remaining issues are addressed  Minimum Requirements evolved into Classic AP  Now much more complex, and at version 4.3  Also SLCS and MICS for new-model CAs 

OGF28 CAOPS/IGTF – Mar David Groep – Relying Party issues to be addressed Key characteristics of the request by our Major Relying Parties 1. standard accreditation profiles sufficient to assure approximate parity in CAs 2. monitor [] signing namespaces for name overlaps and issue unique names 3. a forum [to] participate and raise issues 4. [operation of] a secure collection point for information about CAs which you accredit 5. common practices where possible (list courtesy of the Open Science Grid, backed by EGEE&wLCG)

OGF28 CAOPS/IGTF – Mar David Groep – Geographical coverage of the EUGridPMA  25 of 27 EU member states (all except LU, MT)  +AM, CH, HR, IL, IR, IS, MA, ME, MK, NO, PK, RO, RS, RU, TR, UA, SEE-GRID + CERN (int), DoEGrids(US)* Pending or in progress  SY, ZA, SN

OGF28 CAOPS/IGTF – Mar David Groep – Auditing status  Now done or pending: BalticGrid CA, NIIF CA, PK-grid, CAPolishGrid CA, CERN CA, IUCC, LIPCA, UK eScience CA, pkIRISGrid, ArmeSFo CA, SRCE CA, AEGIS CA  Status  Self audits are done rigorously and usually on time  Implementation of recommendations takes a bit of time (3-6 months)  Review of the self-audit by peers takes a really long time (>12 months), mainly because of overloaded peer reviewers 

OGF28 CAOPS/IGTF – Mar David Groep – Addressing scalability: three directions  Facilitating the issuance process (“Federated CAs”)  Short-lived and MICS issuance  Leverage (existing) high-quality identity systems  Mainly centered around research/educational federations  Facilitate user key management and hygiene (“Private Key Protection guidelines”)  Provide key management tools  Outsource end-user key management  Private Key Protection protocol  Relieve users of the key management problem (“Approved Robots”)  Since many user may only a few ‘canned’ tasks anyway  Funnel user experience through a portal  Have the portal take care of identity and PKI

OGF28 CAOPS/IGTF – Mar David Groep – New federated MICS CAs  Already had 2 federation-backed SLCS CAs: CH, DE  Recently ( ) accredited a multi-national federated MICS CA:  TERENA managed, with a Comodo back-end  Common portal for user applications shared by NL,NO,DK,SE,FI,FR  Leverages federations, but also requires institution to have high-quality IdM  Upcoming: multi-national server CA for e-Science applications  Also managed by TERENA, with Comodo back-end

OGF28 CAOPS/IGTF – Mar David Groep – AuthZ operations policy WG  Foster trust by improving operation of AuthZ Auth  New scoping of the AuthZ Working Group  For now: maintain technical focus on VOMS  AASPs will not be 'accredited' by any particular body, but  Write guideline against which AASPs can assess their implementation and subsequently claim compliance.  Relying parties: either implement post-factum assessment or require pre-auditing of acceptable AASPs  Interaction with issuance of 'AA issuing certificates' by IGTF CAs remains open question  Further discussions  wider consultation with (technical) people and VO reps  focus on AA assertions and infrastructures where actual signature on the assertion is used in the validation

OGF28 CAOPS/IGTF – Mar David Groep – IGTF Release Process and Web  Release Process  Releases moved to (preferably) Monday or Tuesday  More documentation of the process still needed  More checks are now built into the process (Debian!) End use: EUgridPMA site has off-site warm spare – which will be used in July-August during building change  Monitoring and alarms  Nagios: (guest/guest)  Similar setup by Yoshio  PMA Distribution Warnings by 4 times/day  It helps, but reaction to the warnings is down again …

OGF28 CAOPS/IGTF – Mar David Groep – Fetch-CRL  New versions available  2.7.2: even more paranoid about installing in face of AFS file systeminstabilities  2.8.2: all of the above, as well as a random wait option  2.8-series fetch-crl packaging  RPMs now Fedora/EPEL compliant  Included in Koji testing repository  Start testing it now: it integrated better with native OS  Builds: EL4, EL5, F11,12,13  Thanks for Steve Traylen! 

OGF28 CAOPS/IGTF – Mar David Groep – OPENSSL1 Structure of the trust anchor directory Hash functions and code

OGF28 CAOPS/IGTF – Mar David Groep – Structure of the trust anchor store bosui:certificates:1008$ cd /etc/grid-security/certificates/ bosui:certificates:1008$ ls -l|grep 16da -rw-r--r-- 1 root root 5341 Oct 26 21:02 16da rw-r--r-- 1 root root 40 Oct 26 21:02 16da7552.crl_url -rw-r--r-- 1 root root 442 Oct 26 21:02 16da7552.info -rw-r--r-- 1 root root 630 Oct 26 21:02 16da7552.namespaces -rw-r--r-- 1 root root 4842 Jan 13 08:17 16da7552.r0 -rw-r--r-- 1 root root 342 Oct 26 21:02 16da7552.signing_policy bosui:certificates:1009$ ls -l policy-* -rw-r--r-- 1 root root 2633 Oct 26 21:03 policy-igtf-classic.info -rw-r--r-- 1 root root 152 Oct 26 21:03 policy-igtf-mics.info -rw-r--r-- 1 root root 256 Oct 26 21:03 policy-igtf-slcs.info bosui:certificates:1010$ cat policy-igtf-mics.info - IGTF mics authorities # Generated Monday, 26 Oct, 2009 version = 1.32 requires = TACC-MICS = 1.32, \ NCSA-mics = 1.32

OGF28 CAOPS/IGTF – Mar David Groep – Hashes  Hashes used for lookup of the issuing CA for a given certificate  Independent from the ‘fingerprint’ $ openssl x509 -noout -subject -issuer \ -fingerprint -sha1 -hash \ -in 16da subject= /C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth issuer= /C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth SHA1 Fingerprint=E5:FA:C3:3B:44:8F:26:1B:3D:D1:DE:BA:5F:EC:ED:35:A9:3F:23:21 16da7552

OGF28 CAOPS/IGTF – Mar David Groep – Code changed in OpenSSL 1 betas unsigned long X509_NAME_hash(X509_NAME *x) { unsigned long ret=0; unsigned char md[SHA_DIGEST_LENGTH]; /* Make sure X509_NAME structure contains valid cached encoding */ i2d_X509_NAME(x,NULL); EVP_Digest(x->canon_enc, x->canon_enclen, md, NULL, EVP_sha1(), NULL); ret=( ((unsigned long)md[0] )|((unsigned long)md[1]<<8L)| ((unsigned long)md[2]<<16L)|((unsigned long)md[3]<<24L) )&0xffffffffL; return(ret); } unsigned long X509_NAME_hash_old(X509_NAME *x) { unsigned long ret=0; unsigned char md[16]; /* Make sure X509_NAME structure contains valid cached encoding */ i2d_X509_NAME(x,NULL); EVP_Digest(x->bytes->data, x->bytes->length, md, NULL, EVP_md5(), NULL); ret=( ((unsigned long)md[0] )|((unsigned long)md[1]<<8L)| ((unsigned long)md[2]<<16L)|((unsigned long)md[3]<<24L) )&0xffffffffL; return(ret); }

OGF28 CAOPS/IGTF – Mar David Groep – Impact of change  Today: lookup will fail if a new OpenSSL is used  Lookups happen  via the system OpenSSL, dynamically linked  Via application-specific OpenSSL versions  Via statically linked openssl libraries  Via other implementations of the hash algorithm e.g. in the TrustManager Java implementation or in Apache, or...  Both implementations will co-exist on single system  Will thus require  separate trust stores  A single trust store that supports both algorithms

OGF28 CAOPS/IGTF – Mar David Groep – Changes to the IGTF distribution  For installation bundles, tar-balls and RPMs: all CAs and files are named after their alias from the info file  Symlinks are used to generate the structure for both versions of OpenSSL  installation bundle (the "./configure && make && make install" tarball) will create both symlinks  pre-installed bundles have both hashes, also using symlinks

OGF28 CAOPS/IGTF – Mar David Groep – What gets into /etc/grid-security/certificates? 393f > AEGIS.pem 393f7863.info -> AEGIS.info 393f7863.namespaces -> AEGIS.namespaces 393f7863.signing_policy -> AEGIS.signing_policy AEGIS.crl_url AEGIS.info AEGIS.namespaces AEGIS.pem AEGIS.signing_policy cc5645bd.0 -> AEGIS.pem cc5645bd.info -> AEGIS.info cc5645bd.namespaces -> AEGIS.namespaces cc5645bd.signing_policy -> AEGIS.signing_policy

OGF28 CAOPS/IGTF – Mar David Groep – Dual packaging  Pro  Target system does not need to run c_rehash  Works for hybrid deployments, with some software linked to 0.x, others to 1.0, and others have built-in hashing codes  Con  Symlinks may upset (or be messed up by) locally running c_rehash  Unclear which one is used - when the links are severed different programs will react differently  Doesn’t work on filesystems that do not support symlink

OGF28 CAOPS/IGTF – Mar David Groep – Fetch-crl locationFiles=`${ls} \ "${locationDirectory}"/*.${crlLocationFileSuffix} \ 2>/dev/null`  Will find all files with a “.crl_url” suffix  Use the OpenSSL in the path (since v2.7) to compute the hash locally Caveats  The.r0 files will be hashed according to openssl version used by fetch-crl, not target software  make symlinks locally to get a dual-use CRL?  Should we provide a script, or an update to fetch-crl?

OGF28 CAOPS/IGTF – Mar David Groep – Collateral changes  Update RPM format to v4.4 series  Update Java keytool to Java6  Now supports CA keys with keysize > 2048  Keys will not work with old (pre-Java5) tools with Sun JCE  Auto-generated sequence numbers support multiple CAs with the same subject name but different aliases  Alias MUST be unique for each trust anchor  Still not supported in fetch-crl, though  And it’s dangerous anyway (see issues related to the two UTNUserFirst-Hardware CA certs, one self-signed and one by Comodo AAA)

OGF28 CAOPS/IGTF – Mar David Groep – Implementation plan Careful migration to dual-version support:  For releases: both versions available  with the old style as the advertised one for  For 1.36 release, have both versions available with the new style as the advertised one  No earlier than summer 2010  For release, just have the new one, since it’s fully backward-compatible anyway  But also no earlier than Q  RPs: start testing the new dual-stack now, please

Some dates for you to remember and schedule  April 2010: SigmaNet Riga, LV  September 2010: SRCE, Zagreb, HR  January 2011: RedIRIS, Madrid or Sevilla, ES  September 2011: IJS, Ljubljana, Slovenia