180 likes | 364 Views
Presented by Xiaoyu Qin 21637881. Virtualized Access Control & Firewall Virtualization. Outline. Background Project Aims & Previous Research Research Problem Research Approach & Method Analysis Demo Implementation Design Review Future Work Conclusion.
E N D
Presented by Xiaoyu Qin 21637881 Virtualized Access Control & Firewall Virtualization
Outline • Background • Project Aims & Previous Research • Research Problem • Research Approach & Method • Analysis • Demo Implementation • Design Review • Future Work • Conclusion
Background – Grid Network & Security • Application Solutions • Globus Security Infrastructure • Security of Open Grid Services Architecture • Security as Services • Public Key Infrastructure • Virtual Organization & Virtual Connectivity • Gateway Solutions • Common Solutions • Grid Firewall & Firewall Traversal
Background – Understanding Virtualization • Pooling & Reallocating • Resource: Pooling • Infrastructure: Multiplying, Clustering • Simulation • Simulators: VMs • Application Virtualization: Sandbox • Network: Tunnelling • Grid: Virtual Organization * • Firewall Virtualization • Dynamic Firewall • Zone Based Virtual Firewall • Virtual Access Control
Project Aims & Previous Research – Security Gateway for Grid • Grid Security Scenario • Unpredictable application & users • Dynamic • Large quantity of devices • Security Gateway • Packet Filtering • Access Control • Intrusion Detection/Prevention
Project Aims & Previous Research – Firewall Traversal & Firewall Virtualization • Firewall Proxy Model • Firewall Control Model
Research Problem – NAT Problem • Server IP + Port == A TCP Service • Source IP + Port != Client User Identity
Research Approach & Method • Research Approach • A grid firewall solution • Without NAT problem • Easy to implement & deploy • Research Method • Problem Oriented Research
Analysis – Research Questions • Central Question : • How do we determine the identity information? • Q1: What can a firewall determine? How? • What can a pure network firewall determine? • Is there any other choice (IPTables) which can do more? • Q2: How to generate and carry the information which can be determined? • Can the program change some existing properties of the communication? How? • Can the program add new properties? How?
Analysis – Research Hypotheses • Capability of Network Firewall • IP: Source and target IP address • TCP: Source and target port • Protocol • Special Capability of IPTables • Owner: uid, pid, gid...... (IPFW has also ‘out uid’) • Change existing properties of communication • Packet based: • Changing Address: Authentication based NAT/PAT • Changing protocol: Tunnel/Proxy (useless) • Connection based: • Extra handshake (hard to implement) • Can the program add new properties? How? • Application specific Tunnel/Proxy
Analysis – Possible Solution: NAT/PAT • Cons • Customize IP assigning mechanism • Not supported by most of current VPN solutions • Hard to program • Check after tunnel created • Complex control signal • Delay caused • Hard to program but possible* • Pro • Existing firewall can be used, but extra component to run the program is still needed.
Analysis – Possible Solution: Tunnel/Proxy • Few Firewall Choice: IPTables, IPFW… • Tunnel Proxy Choice • Does it create process for each session? • Can the process owner one-to-one map to the client identity? • SSH Port Forwarding • Pros: • Commonly used • Gateway-to-Gateway • Only tunnel the request (Comparing with VPN) • Cons: Client command & settings • Other methods can be examined
Demo Implementation • VAC> show • use whitelist • service 0 10.1.1.2:80 TCP //Http AppServer • ACCEPT User xyqin1 • Client>ssh -N -f -L 80:10.1.1.2:80 xyqin1@VFW
Design Review • NAT Problem • NAT between the gateways does not harm • Efficiency Cost • Pre-defined tunnel and filtering rules • One time encapsulating • Only tunnel the request • Non-Cipher SSH is a choice & SSH is not the only choice • Capability & Reliability • Clustering • Load Balance
Future Work • Virtualization • Scalable (Zones, Multiple Instances) • Dynamic Access Control • Clustering • Usability • Client side program • Remote Administration • Distributable • Authentication Server • Extendable • Extensions? API?
Conclusion • It is possible and necessary to implement authentication based access control on grid gateway, which is secure, extensible and interoperable with grid. • Pure network filtering firewall is very weak solution for grid security purpose. • Grid security needs application level methods because of virtualization.