problems with VO certificate authorities

Ray Plante rplante at poplar.ncsa.uiuc.edu
Wed Oct 25 15:50:18 PDT 2006


Hi Roy,

Did you try to use the end-entity cert (i.e. long-lived, non-proxy 
certificate) in your browser?  Did it work?

First, I believe we can issue somewhat long-lived certificate for download 
for loading into client applications, such as a browser.  This has always 
been in our plan.  In general, it should not matter whether this is a 
proxy or an end-entity cert.  The need for an end-entity cert would be 
interfacing non-VO services that don't know how to deal with proxies.  Any 
new VO-compatible service MUST support proxies.

Second, I want to review the reasons why in both the HEP and SC 
communitites users are prompted for a password to create a proxy:
    o  someone that has access to your laptop/workstation does not have
         access to your remote privileges.
    o  creating a limited lifetime proxy limits what (e.g. damage) the
         holder can do on your behalf.

The danger in loading a long-lived, end-entity cert into a browser is that 
anyone who has access to the open browser can access your assets.  Is 
there a mechanism to protect against that?

Also, as a general practice, it also has the disadvantage that it's not a 
great solution for the broadest community.  It's "complicated" for the 
naive user, and you have to deal with the plethora of browsers out there. 
Note that my credit card company and bank do not issue me a certificate 
for loading into my browser; rather they make me login over a secure 
channel.

When it comes to browser-based interfaces to services, I believe 
portal-managed certificate model is the safer approach and easiest for 
users; however, I think the direct approach you want to use is worth 
developing to see what it can do.  In particular, I would like to 
understand under what conditions the latter model is particularly useful. 
(Do you see it as the most common mode of operation?)

Of course, the portal-managed certificate model shifts the complications 
to the portal (as I believe it should); in particular,
   o  the portal must track a session via a store of active proxies
   o  if the service being accessed trusts VO certs, then the portal can
        use the cert directly.
   o  if the service does *not* trust VO certs, the portal must use a
        "community" cert that the service does trust.  This in effect would
        have to be a long-term and well-protected cert that can be used
        by the web server without a password.

Finally, I feel that if we want our VO certs to be trusted both by our own 
service developers and the broader community (e.g. the grid community), 
then we need to take measures to establish secure practices.

> This note refers to:
> Single-Sign-On Authentication for the IVO: introduction and description of 
> principles
> http://www.ivoa.net/Documents/Notes/SSO/SSO-introduction-20051002.html

All that said, I would have to admit that it may be unclear in the SSO 
document whether one is to interpret section 9, "Recommendations for the 
VO" as just recommendations or a set of compliance assertions.  While some 
should be advisory ("Support external CAs"), others are more at the crux 
of interoperability ("Use X.509 certificates as warrants...").  I believe 
though that this is a principles document that more specific standards 
will base themselves on; but this could be made clearer.

In other words, I don't think this document says that you can't use 
long-lived credentials in a browser.  However, it advises against this for 
the reasons reiterated above.

hope this helps,
Ray



More information about the grid mailing list