OSCARS Message Security

Overview

The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service interface is run as an axis2 service within the Tomcat container that has message signing implemented by the Rampart software. The SSL connection assures the user that he is connecting to a legitimate OSCARS server, and encrypts all data that passes between the client and the server. The message signing assures the OSCARS service that the request came from an authenticated user that can be matched against its list of authorized users. Signed messages are required rather than SSL client authentication, because there may be more than one host machine between the client and the OSCARS service. Signed messages assure end-to-end authentication, where SSL does only point-to-point authentication.

The client needs to have access to a private key and its matching X509 certificate for message signing, and the the X509 certificate chain of the server that it is contacting. The Tomcat server needs access to a private key and X509 certificate to identify itself to the client and to encrypt the SSL connection. The OSCARS service needs the X509 certificate of the CA (Certificate Authority) that issued the user certificate in order to authenticate the message signature.

There is an additional complication presented by the interdomain architecture. The OSCARS server and OSCARS scheduler in each domain will also act as a client when information about a reservation needs to be forwarded to an adjacent domain. Thus on an OSCARS server host there will be both server and client configurations.

Since all of the code is in Java, the private keys and certificates are kept in Java keystore files, and the configuration information is kept in properties files.

Configuration Files

Keystore files

Class Files

Client side

Needs an axis2.xml file to generate signed messages.

Needs sec-client.properties to define the keystore file and password.

Needs sec-client.jks with the keyEntry for the user who will be signing messages. For the user this should be a file with just the trustedCertEntries to which the user adds his key/cert. see exampleClients.html for instructions on how to do this.

Needs ssl-keystore.jks to hold the trustedCert entries for the ssl connection to the Tomcat server. The name and the password for this file are hard-coded into net.es.oscars.client.security. KeyManagement.

The default ant task in examples/javaClients/build.xml will create and populate a repo directory with all these pieces. The user may want to edit the axis2.xml to chose a different user to sign the message and may want to add additional keyEntries to sec-client.jks. Any edited files should be copied to someplace safe since the repo directory is purged and recreated each time ant is run.

Server side

OSCARS needs the properties and keystore referenced in OSCARS.aar:META-INF/services.xml.
Services.xml comes from conf/server/services.xml. The properties and keystore files are installed at the top level OSCARS.aar and are domain specific. The ones for esnet are checked into https://oscars.es.net/esnet/domain. The ant target "prepare" will copy them from $DOMAIN_HOME/server into build/WEB-INF where they will be input to the OSCARS.aar. Examples of these files can be found in examples/server. The server keystore only needs trustedCertEntires since response messages are not signed.

Tomcat needs the keystore referenced in ${catalina.home}/conf/server.xml to do server-side ssl.
If no keystoreFile entry is specified in the https connector element of server.xml, the file ~/.keystore is used.
If no keystorePass entry is specified the password is "changeit".
On oscars-dev keystoreFile element of the Connector for port 9090 is /root/.keystore. The keystore contains a keyEntry for the oscars-dev cert/key with alias tomcat and the trustedcert entries for that key.

Server acting as client, e.g when forwarding request to next Domain

Needs trustedCertEnties and oscars-dev keyEntry, (not distributed outside of LBL in domain/client/sec-client.jks). The ant task "setupServer" will create a repo directory with the necessary axis2.xml, sec-client.properties, sec-client.jks and ssl-keystore.jks in ${catalina.home}/shared/classes/repo directory.