Title: Authenticated QoS Signaling
1Authenticated QoS Signaling
- William A. (Andy) Adamson
- Olga Kornievskaia
- CITI, University of Michigan
2Motivation
- Michigan High Energy Physics Group are involved
in key phases of the ATLAS project - Video conferencing, distributed shared workspace
- Bulk data transfer
- Advances in QoS are necessary to further this
research. - Impact on University of Michigan Community
- Many other projects face similar problems
- Bandwidth allocation already an issue on campus
(Napster).
3Participants
- UMICH - Physics, LSA, ITCom, OVPR
- Merit
- UCAID
- ANL
- CERN
- PSC
4Vision
- Reliable high speed end to end service
- Cross campus
- To external sites across high speed (Internet2)
networks - Automated access and network configuration
- Use of existing infrastructure
- Currently requires hands on at every stage
- Divide and conquer
- network tuning
- security component
- automated network configuration
5Project Goals
- Realize authenticated bandwidth reservation
signaling - Integration and extension of existing work and
infrastructure - Distributed authorization proof of concept
- Implement the architecture for demonstration,
pre-production, and future research
6Not Project Goals
- Answer all distributed authorization design
questions - Network tuning
- Aggregate traffic issues
- Multicast bandwidth reservation
- Production system
7Architecture
- Construct end point QoS network domains
- Use QoS features in existing routers
- Over provision connecting networks
- No change to application
- QoS reservation communication via a web
interface - Routers mark packets, not application
8QoS Network Domain
- Bandwidth broker
- Authorization service
- LDAP directory service
- X509 security infrastructure
- Routers with packet-marking and policing features
9Network Path
ITCom
Physics
100M
BB
Merit
UMICH
CITI
622M
622M
100M
Cleveland
Startap
622M
45M
Argonne
BB
CERN
PSC
BB
BB
Abilene
10Bandwidth Broker
- GARA, from ANL
- Integrated with their Grid reservation system
- X509 based authentication
- Flat file access control for authorization
- No inter bandwidth broker communication
11Authentication
- Globus PKI based GSSAPI_SSLEAY
- Globus user proxy
- Obviates the need for multiple password entry
- Enables remote services to act on users behalf
- No CA peering exchange self-signed CA
certificates - UMICH Kerberos solution KX509 - junk keys
- Short term keys granted with valid kerberos
identity - Stored in kerberos ticket cache
12Authentication
Globus Client
Globus
gssapi_ssleay
globus-proxy-init
Gatekeeper
Resource Manager
Home Directory
X509 long lived creds
X509 proxy creds
GARA
WS
Router
Router
13Problems with long lived keys
- limited access to private key, not mobile
- the longer you distribute a public key, the more
places it is cached, and the problematic
revocation becomes. - Short-lived kx509 generated junk keys address
these problems
14Kx509 Authentication
Kerberos DB
KCA ticket
Globus Client
kinit
Globus
gssapi_ssleay
Gatekeeper
globus-proxy-init
Resource Manager
Home Directory
X509 proxy creds
GARA
kx509
Kerberos Ticket Cache
WS
X509 junk-key creds
Kerberos CA
Router
Router
15Distributed Authorization
- Problem Local users, remote resources
- Ideally, no copying of user or resource data
- In common case, no extra communication
- Solution we will explore
- Common LDAP namespace and schema
- Pass authorization attributes with identity
- Requires the ability to do SSL mutual
authentication between remote sites
16Authorization Server
- Akenti access control system from lbl.gov
- Policy engine that can express complex policies
- User attributes, resource use-conditions
- Distributed management from many sources
- LDAP back end
- Internet2 middleware working group schema
- Akenti data
17Akenti Authorization
- LDAP schema required for users, resources,
user-attributes and use-conditions - user-attributes are assigned to users
- use-conditions are assigned to resources
- Access for a user to a resource is determined by
comparing user attributes to resource
use-conditions
18Local Akenti Authorization
- Akenti policy engine receives a request
- can Alice reserver 10MB of bandwidth on
subnet-1? - All data required to make the decision is held
locally in the Akenti/LDAP service - Since Alice holds all the necessary attributes
required by the resource, access is granted.
Akenti LDAP back end
Resource subnet-1
User alice
internet2_bw_group umich_staff_group 10MB_bandwidt
h ...
Member umich_staff_group not member
bad_users_group member internet2_bw_group 10MB or
less bandwidth request
19Akenti Authorization of Remote Resource
- Akenti policy engine receives a request
- can Alice reserver 10MB of bandwidth on remote
subnet-1? - User data required to make the decision is held
locally - Resource data held by remote Akenti/LDAP service
- Send user identity and appropriate attributes to
the remote Akenti/LDAP service over secure channel
Akenti LDAP back end
Akenti LDAP back end
Resource subnet-1
User alice
User attributes
Member umich_staff_group not member
bad_users_group member internet2_bw_group 10MB or
less bandwidth request
internet2_bw_group umich_staff_group 10MB_bandwidt
h
20Akenti Authorization of Remote Resource
- Akenti policy engine receives a request
- can Alice reserver 10MB of bandwidth on remote
subnet-1? - Remote Akenti/LDAP service compares the user
attributes received off the wire to the resource
use-conditions. - Since Alice holds all the necessary attributes
required by the resource, access is granted
Akenti LDAP back end
Akenti LDAP back end
Resource subnet-1
User alice
Access granted
Member umich_staff_group not member
bad_users_group member internet2_bw_group 10MB or
less bandwidth request
internet2_bw_group umich_staff_group 10MB_bandwidt
h
21 Common Namespace
- Necessary to communicate distributed
authorization decision parameters - Enables minimal replication of resource and user
data - Complicates namespace administration, simplifies
authorization communication - Each authorization realm assigns local values
22Globus Client
GARA
GARA
Access File
GK
Gatekeeper
RM
Authorization_API
Akenti
user attributes
LDAP
Resource Manager
Akenti
LDAP
Router
CPU
23 Status
- Completed kx509 integration
- Configured and tested GARA to reserve bandwidth
on Cisco 7500 at UMICH - Preparing to test with remote bandwidth
reservation ANL and CERN using current
functionality - Netscape LDAP with Internet2 Eduperson schema
- Just starting work with Akenti
24Questions?
- http/www.citi.umich.edu/projects/qos
- htttp/www.globus.org
- http//www-itg.lbl.gov/security/Akenti