0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles...

16
!"#$%# '() *%+ ,-.#-//%#-. 0(-(./% 1/2 3($ 4-5+ 6789:89767 !"# %&' ()"* +, -"./".+0 1,'".+2".&/)3)'4 ), 5)6"# 7,8).+,9",'0

Transcript of 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles...

Page 1: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

! !

!"#$%#&'()

*%+&,-.#-//%#-.&0(-(./%

1/2&3($&4-5+6789:89767

!"#$%&'$()"*$+,$-"./".+0

1,'".+2".&/)3)'4$),$5)6"#$7,8).+,9",'0

Page 2: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

9

:.&#)')+,&3$8)"*$+,$-"./".+0$),'".+2".&/)3)'4

;5$#</;5$#</!#%/5$=%>!#%/5$=%>

04?&@!A04?&@!A *("B(&C*("B(&C

D#-2=EF&A)#/-$FGH4I8J#-KLA)#/-$F

1/M)#5($/2&/-<#%=-"/-$

H=$&(&M%#"(%>KF/&5(F/D(F&"=F$)>&(&"#.%($#=-&F$/M&#-&$N/&M(F$

;&')8"$<"./".+0$2.+'+=+3-"./".+0$*)'>$?@A"6'",0)+,0$&,#$+'>".$,&')8"$2.+'+=+30

!&A",'.)B4!$C)<"*)0"!$DE"0'!$F&9/&$G*),/),#H

Page 3: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

O

76'",#"#$()"*

;5$#</;5$#</!#%/5$=%>!#%/5$=%>

4';4';

*("B(&C*("B(&C

D#-2=EF&A)#/-$FGH4I8J#-KL&A)#/-$F

1/M)#5($/2/-<#%=-"/-$

;&')8"$<"./".+0$2.+'+=+3 -"./".+0$*)'>$?@A"6'",0)+,0$&,#$+'>".,&')8"$2.+'+=+30

04?@!A

!$A",'.)B4!$C)<"*)0"!$DE"0'!$F&9/&$G*),/),#H

*KBF/$&=P

*("B(

A%=FFQP=%/F$&@/%B/%=F&?%KF$

***!

Page 4: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

C

1?@

! *$(-2F&42/-$#$>&'=)#5>&;K2#$&"=F$)>&42/-$#$>&(-2&*="/&'=)#5>+&;K2#$&#F&2/P/%%/2&P=%&-=E+&

! 4$&#F&(&2="(#-&5=-$%=))/%&P=%&GH4I8J#-KL&/-<#%=-"/-$FR&FK55/FF=%&=P&H4*&(-2&(-&()$/%-($#</&$=&MK%/&J!;'&=%&MK%/&@/%B/%=F&F=)K$#=-F&B%#-.#-.&$N/&B/F$&=P&$N/&$E=&E=%)2F&$=./$N/%&&

! S)K/F&04?&@/%B/%=F&E#$N&OTU&!#%/5$=%>&*/%</%

! VM/-&F=K%5/&M%=W/5$&X&P%//4';+&*$(%$/2&(B=K$&O&>/(%F&(.=

! ;&1/2&3($&FKMM=%$/2&</%F#=-&=P&4';&#F&M)(--/2&P=%&P=%&-/L$&5()/-2(%&>/(%+&D#))&)/</%(./&04?&@/%B/%=F&6+U+

! 4';&(22F&K-#P#/2&@/%B/%=F&M(FFE=%2&N(-2)#-.&<#(&@/%B/%=F&M%=$=5=)&=%&J!;'

! 0(#-&P/($K%/FY&

! 3=F$&#2/-$#$>! !H*! */%</%&A/%$F! 3Z;A

! ;K$="=K-$! H/$.%=KMF! *G!V/$5+

Page 5: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Cross Platform Kerberos Interoperability

David McNeely

Director of Product Management

Centrify Corporation

[email protected]

(408) 542-7518

Page 6: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Cross Platform Kerberos Interoperability •  Integration into UNIX, Linux and Mac for Windows interoperability

•  Kerberos services support cross platform interoperability for strong authentication

•  Centrify Suite modifies MIT Kerberos to ensure smooth AD interoperation (domain detection, suppress DNS traffic, transient trust support,…)

•  Integration into UNIX/Linux services via automated Kerberos config: •  OpenSSH, Samba, NFSv4, etc…

•  Apache, J2EE App Servers, SAP, Sybase, Oracle Advanced Security, etc…

© 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 2

root dba

Unix Roles

& Privileges

Unix

Profiles

Security

Policies Groups Users

Admins

Active Directory Kerberos-based Security Infrastructure Service

Page 7: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Kerberizing OpenSSH and PuTTY •  OpenSSH is linked with the DirectControl’s

Kerberos libraries

•  Aware of Kerberos tickets and PAM

•  No need for a .k5login file

•  Works with any of the computer’s valid hostnames

•  PuTTY is linked with Windows Kerberos library

•  Windows users provided Single Sign-On to UNIX

© 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 3

Page 8: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Cross Platform KDC Interoperability •  KDC interoperability is provided through 2-way cross trusts

•  Active Directory KDC is used to manage resource accounts and security policies

•  Users from MIT KDC can login to authorized AD computers and applications

© 2004-2010 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. SLIDE 4

root dba

Unix Roles

& Privileges

Unix

Profiles

Security

Policies Groups

Admins

Active Directory Kerberos-based Security Infrastructure Service

Account

Policies

Users

MIT Kerberos KDC

Cross

Realm Trust

Page 9: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

1

F5-ARX and Kerberos MIT Kerberos Consortium 2010

JC Ferguson Director/Architect - Product Development Lowell, Massachusetts email: [email protected]

October 2010

Page 10: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

2

Product overview

•  Storage virtualization product: –  Started as Acopia Networks in 2002.

•  Adds a second ‘tier’ to storage architectures positioned between clients and file servers.

•  Supports both NFS and CIFS network file-access protocols.

•  Benefits: –  Global namespace / single mount point –  Cost savings by tiering old data to cheaper storage –  Vendor mobility – seamless migration from one vendor to

another vendor’s storage device.

Page 11: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

3

Challenge: Authentication model

•  As a proxy device, we really had two choices: –  Do all authentication and authorization to file objects

on the F5-ARX device. –  Do initial authentication on the F5-ARX device and

defer authorization to file objects to the file servers. •  The former would require us to read and process

ACLs on file objects: –  Would require a lot of interaction with Active Directory. –  Getting it incorrect would have negative

consequences. •  We ultimately chose the latter (next slide)

Page 12: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

4

F5-ARX Authentication Architecture

Domain Controller

clients

NTLM or NTLMv2 or Kerberos

NETLOGON – for NTLM and NTLMv2 authentication

Filer  

Filer  

Filer  

Filer  

Kerberos

S4U – for obtaining service tickets for client impersonation

CIFS: user “JC”

Vendor A

Vendor B

Vendor C

Vendor D

.

.

.

MIT KRB5 1.8

CIFS: user “JC” to each file server in our

“virtual volume”

Page 13: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Hadoop’s Kerberos Interoperability

Kerberos Conference 2010

Owen O’Malley [email protected] Yahoo’s Hadoop Development

Page 14: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Kerberos Conference - 2010

What is Hadoop?

•  A framework for big data computation –  Supports 4,000 machine clusters, 10’s of PB –  Mixes distributed storage and computation for very

high throughput. –  Critical to Yahoo!, Facebook, Twitter, LinkedIn –  40,000 dedicated Hadoop machines at Yahoo! –  Runs on Linux, Solaris, MacOS, or Windows –  Written primarily in Java –  Possible to run in Amazon’s EC2

2

Page 15: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Kerberos Conference - 2010

Java Challenges

•  Implemented their own code instead of linking with C library. –  Configuration file differences (udp_preference_limit = 1) –  Way too many OS switches (Win, Sun, Linux) –  Need “extra” files installed in JVM to

•  Shipped with JVM, very hard to change •  Most of the Kerberos classes are private

–  Compiler warnings if you use them instead of JAAS –  Not portable between JVMs

•  Thank goodness for OpenJDK!

Page 16: 0 1,'.+2.&/)3)'4$),$5)6#$7,8).+,9,'0 · SLIDE 2 dba root Unix Roles & Privileges Unix Profiles Security Policies Users Groups Admins Active Directory Kerberos-based Security Infrastructure

Kerberos Conference - 2010

HTTP Challenges

•  Mostly use RPC, but HTTP is important •  SPNEGO

–  Service Principal Name: HTTP/hostname –  Supported by most browsers

•  Requires configured white list of URLs on each client –  No Java Support

•  TLS/Kerberos –  Service Principal Name: HOST/hostname –  Not supported by browsers –  Client Java support