problems with VO certificate authorities
Roy Williams
roy at cacr.caltech.edu
Tue Oct 24 09:20:38 PDT 2006
This note refers to:
Single-Sign-On Authentication for the IVO: introduction and description
of principles
http://www.ivoa.net/Documents/Notes/SSO/SSO-introduction-20051002.html
Guy and Ray
As you know, we are building a system (Nesssi) to allow VO clients to
run secure batch jobs on major computing resources. The intention is to
support a multiple usage models, where the client can be authenticated
weakly or strongly, and can use a web page or a commandline to drive the
system. We have been following the model outlined in your paper above,
but I think it is time to revise the document.
We have built two prototypes, one is complicated and based on your
proposed VO model, and the other is much simpler and is what the HEP
community has adopted. Each aims to connect a Client to a Resource
securely. We are not considering workflows or delegation in our model.
Specifically:
(1) The NVO model keeps all certificates (aka "warrants") in a
certificate store, and only issues proxies. This forces one of two
architectures:
(a) There is an intermediate Proxy between Client and Resource that
connects to the cert store, gets a proxy, and sends it to the Resource
on behalf of the Client. Note that there are now four systems
interacting securely. This is quite a complex and delicate arrangement.
(b) The user runs a program that connects to the cert store to obtain a
proxy, then sends that to the Resource. It works well for commandline
access, but is awkward if the client uses web access -- because the
proxy must be loaded into the browser again *every day*.
(2) The HEP model assumes that the Client has the certificate locally.
For commandline, a proxy can be created with a program like
globus_proxy_init. For web application, the cert is loaded *once* into
the browser, and a Javascript application used to connect to the
Resource. The advantages are:
-- No need for a Proxy machine between Client and Resource, and no need
for the cert store (except once to fetch the cert).
-- Easily extensible to "normal" certificate authorites, where you get
the cert itself instead of all this messing about with cert stores and
proxies.
THEREFORE
I would like to use VO certificate authorities for VO work. BUT it is
awkward to do so because of the artificial restrictions that are
embedded in the model, specifically two of your Recommendations in
section 9: "Don't issue long-term warrants to users" and "Issue warrants
to user agents, not to users"
If these can be eliminated, I would be happy with using VO-sanctioned
cert authorities.
Thank you
Roy
More information about the grid
mailing list