grid computing security - hack.luarchive.hack.lu/2006/gcsec.pdf · 20.10.2006 hack.lu 2006 ::...

51
20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 1 Grid Computing Security

Upload: others

Post on 13-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 1

Grid

Computing

Security

Page 2: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 2

What to expect from this talk

• Collection of bits about GC I thought you might find interesting

• Mixed bag:• Systems engineering considerations• Exploration without bounds

Page 3: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 3

What to expect from this talk

Shed some light on these questions:• What is Grid Computing about?• Why is it interesting to computer

security folk?• What is the status quo in Grid

Computing, security-wise?

Page 4: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 4

Fahrplan

• Introduction to Grid Computing• Assorted Interesting Grid Issues• Globus Toolkit & Issues• Possible playgrounds

Page 5: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 5

What is Grid Computing?

Grid Computing is

• Kind of Distributed Computing

Page 6: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 6

.* Computing

Distributed Computing

ParallelComputing

Grid Computing

Page 7: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 7

What is Grid Computing?

Grid Computing is

• Kind of Distributed Computing• Direction of development in systems

engineering• Yet Another Virtualization Effort• Pragmatic Virtualization

Page 8: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 8

The problem of Grid Computing

• Pre-existing infrastructure• Hardware• Software• Organizations• Policies

• (Dynamically) Tie together resources

Page 9: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 9

Heterogeneity

• Purpose of Unit• Hardware• Software• Connectivity• Trust

Page 10: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 10

COs rule (literally)

• Important principle: COs always retain full control of their resouces

• (resource owners always retain full control of that resource)

Page 11: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 11

Virtual Organizations

• VOs – Virtual Organizations, COs –Conventional Organizations

• VOs: Created through overlay on COs

Page 12: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 12

Virtual Organizations – Properties

• Lifetime: Arbitrary• Highly dynamic• User-driven

Page 13: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 13

Purpose of VOs

• Reconciliation across COs:• different technologies• different policies

• Providing environment for cooperation across CO-boundaries

Page 14: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 14

Old wine in larger bottles…

• Some problems are 30+ years old• First occurred in larger multi-user

computing environments• Often see scaled up versions of these

old problems in GC

Page 15: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 15

Short Summary: GC Features

• Pragmatic Virtualization• Use what’s there• Share what’s there• Obey existing policies

Page 16: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 16

Applications

Grid Computing applications are today found in:

• Science• Life sciences• Physics

• Medical environments• Hospitals

• Business

Page 17: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 17

Grid Scenario I: LHC Computing Grid

• Large Hadron Collider Computing Grid• Hosted mainly at CERN in Geneve• Uses

• Globus Toolkit Version 2• Condor• gLite• More middleware developed in DataGrid project

http://lcg.web.cern.ch/LCG/activities/middleware.html

Page 18: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18

LHC Computing Grid“When it begins operations in 2007, it will

produce roughly 15 Petabytes (15 millionGigabytes) of data annually, which thousands of scientists around the world willaccess and analyse.

The mission of the LHC Computing Project(LCG) is to build and maintain a data storageand analysis infrastructure for the entire highenergy physics community that will use theLHC.”

Page 19: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 19

Grid Scenario II: seti@home

• Large number of desktop PCs• Different infrastructure, software,

connectivity• Resources “shared” in a rather

unidirectional way• Participants don’t know each other, no

reason for trust

Page 20: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 20

Grid Scenario III: Sun Grid

• Commercial service• Users can rent time and storage in Sun

Grid

Page 21: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 21

Grid Scenario IV: MediGRID

• German Biosciences Research project• Processing and sharing of biomedical

data• Protection requirements for some of the

data regulated by law

Page 22: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 22

Threats to Grid Systems“Threat” as in “goal of an attacker”

Random compromise (e.g. for botnets)• Gateway to more interesting targets• Access to restricted databases

• Research databases• Sensitive information, e.g. MediGRID

• Harvesting computing power• Access to interesting devices

Page 23: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 23

Attack vectors for Grid Systems• Middleware software• Custom software• Identity/Authorization infrastructure• Underlying software

• OS• SSL implementation• ssh implementation• …

Page 24: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 24

Security Issues in Grid Computing

• Yes.

• Conceptual issues• Issues in existing

• Architecture• Implementation

• Unsolved security-relevant problems

Page 25: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 25

Access Control• Conventional:

• MAC for• network boundary traversal• Resource access

• DAC for user file access• Grid Computing:

• DAC for• User file access• Resource access• Network boundary traversal

Page 26: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 26

“There are often firewalls and NATs between them, which are blocking packets. We believe it's going to be criticalto the future of grid, not that you remove those things but that you make them another managed component ofthe grid that can be dynamically configured andreconfigured based on application needs. If I need toget two jobs talking to each other, but there's a firewall between them, I should be able to negotiate with that firewall to allow those two jobs to talk with each other,perhaps only for a limited period of time.“ – Steven Tuecke

http://www-128.ibm.com/developerworks/grid/library/gr-tuecke/

Page 27: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 27

Authorization

• Done via Identification per default:• Store lists of “$user is allowed to do

$action” and “$user is not allowed to do $action” rules

• Establish the identity of a requester• Derive from identity + list of rules whether

requested action is authorized

Page 28: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 28

Authorization and Identification

Shifts problem to identification. Trouble.

• Identification is a hard problem, esp. with only machines involved

Makes “Identification without Authorization” an interesting research topic

Page 29: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 29

The Firewalling Mentality

• “Put a wall around the network. Inside: Good. Outside: Bad.”

Page 30: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 30

The Firewalling Mentality

• Grid Computing ideal and Firewalling Mentality clash

• But can’t we use DMZs…?

Page 31: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 31

DMZs to the Rescue

Just put the particle accelerator in the DMZ?

Page 32: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 32

Firewalling and DMZs

• Modelling around this with DMZs: not really• “Share resource with some” “Put it in

the DMZ”?• Dynamic sharing and DAC – remember?

Page 33: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 33

Open Problems in GC security

• Authorization• Users vs. Hosts: Minimize required level

of trust

Page 34: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 34

Globus Toolkit

• Globus Toolkit (GT) provides Grid middleware• e.g. GRAM, GSI, GridFTP

• Foundation for actual Grid applications• Widely used

Page 35: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 35

Globus Toolkit• Written mainly in

• Java• C/C++

• APIs for other languages available, e.g. pyGlobus

• Earlier versions: more C/C++, newer versions: more Java

• “Latest version” seemingly not that common…

Page 36: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 36

Some Globus Toolkit Users

• TeraGrid• LHCGrid (Large Hadron Collider Grid)• Fraunhofer Resource Grid• NASA Energy Grid

Page 37: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 37

GT and the GSI

• Globus Security Infrastructure• Collection of security-related protocols

and services within the GT• CAS• MyProxy• SimpleCA

Page 38: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 38

Identification in Globus

• X.509 end-entity certificates• X.509 proxy certificates (RFC 3820)

• Single sign-on• Delegation

• Identity mapping• X.509 vs Kerberos vs UNIX accounts

Page 39: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 39

CAS

• Community Authorization Service• Problem domain: Distributed policy

definition and enforcement• Implementation in Java

Page 40: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 40

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

User Bert is granted read access to

/share/funkyvo/bert/*

/share/lhcraw/*

FunkyVO policy

Option 1: Store both policies locally

Option 2: Store site policy locally, VOpolicy somewhere else

Page 41: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 41

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

User Bert is granted read access to

/share/funkyvo/bert/*

/share/lhcraw/*

FunkyVO policy

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

User Bert is granted read access to

/share/funkyvo/bert/*

/share/lhcraw/*

FunkyVO policy

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

User Bert is granted read access to

/share/funkyvo/bert/*

/share/lhcraw/*

FunkyVO policy

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

User Bert is granted read access to

/share/funkyvo/bert/*

/share/lhcraw/*

FunkyVO policy

Page 42: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 42

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

FunkyVO is granted full file access to

/share/funkyvo/*

/share/lhcraw/*

Local site policy

User Bert is granted read access to

/share/funkyvo/bert/*

/share/lhcraw/*

FunkyVO policy

CAS server

Page 43: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 43

CAS• User authenticates to CAS server• CAS server sends signed capabilities to user• User generates new keypair and proxy cert

with capabilities embedded• User authenticates to resource• User presents the proxycert+capabilities to

resource• Resource authorizes the required action or

rejects it

Page 44: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 44

Find the CAS server

• CAS server is a SPF• Even more of a juicy target:

• Get information on structure of VO• Participating hosts• Participating people• Existing resources

• Create your own VO access rules• Get information on valid proxy certs

Page 45: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 45

gridftp

• Extension of FTP to support striped and remote-controlled transfer

• Part of Globus• Implementation in Globus based on

wuftpd

Page 46: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 46

gridftpd

• CVE-2004-0185 – wuftpdcharpwok){

}

*skey_challenge(char *name, struct passwd *pwd, int

static char buf[128];...if (pwd == NULL || skeychallenge(&skey, pwd->pw_name,

sbuf))sprintf(buf, "Password required for %s.", name);

elsesprintf(buf, "%s %s for %s.", sbuf,

pwok ? "allowed" : "required", name);return (buf);

ftpd.c from wuftpd

Page 47: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 47

gridftpdchar *skey_challenge(char *name, struct passwd *pwd, int

pwok){

static char buf[128];char sbuf[40];struct skey skey;

/* Display s/key challenge where appropriate. */

if (pwd == NULL || skeychallenge(&skey, pwd->pw_name,

elsesprintf(buf, "%s %s for %s.", sbuf,

pwok ? "allowed" : "required", name);return (buf);

}

sbuf))sprintf(buf, "Password required for %s.", name);

ftpd.c from gsi-wuftpd(gridftp), GT 4.0.2

Page 48: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 48

Code Quality Examples

• MyProxy• Sloppy malloc return code handling

• GRAM• More solid code

Page 49: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 49

Things to do in long winter nights

• Proper code audit of Grid middleware• Architecture review of Grid middleware• Architecture & implementation review of

Grid applications• Puzzling over unsolved fundamental

problems• Investigate implications of “service-

oriented architecture” fancy

Page 50: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 50

?

Page 51: Grid Computing Security - Hack.luarchive.hack.lu/2006/Gcsec.pdf · 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 18 LHC Computing Grid “When it begins operations

20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 51

References

• The Grid 2. Blueprint for a new Computing Infrastructure, Foster et al

• http://www.globus.org/• Hacking the Grid, talk given at 5th Hope

by Greg Newby