Flexible Session Management in a Distributed Environment
Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR’s separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR’s structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR’s architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems.
💡 Research Summary
The paper begins by pointing out a fundamental shortcoming in many widely‑used secure communication libraries such as SSL/TLS and Kerberos: they conflate the authentication, session, and data‑transfer layers. This conflation forces every new connection to repeat costly handshakes, which becomes a scalability bottleneck in large‑scale distributed systems. To address this, the authors introduce CEDAR (Communication and Encryption Data Access and Retrieval), the security library that underpins the Condor High‑Throughput Computing (HTC) framework, and they describe how its layered architecture separates concerns and enables powerful optimizations.
In CEDAR’s first layer, authentication is performed once to verify the identity of a user or host. Upon successful authentication a unique session key is generated; this key is the sole cryptographic material used by the remaining layers. The second layer, the session management layer, builds on that key to provide encryption, integrity checking, compression, and other services. Its most innovative feature is session delegation. A session object can be packaged into a signed “session token” that contains the session key and a small amount of metadata (expiration time, allowed peers, capabilities). Any component that receives a valid token can immediately start using the session without contacting the original authenticator. This creates a chain of trust: a manager can delegate a session to a worker, a worker can further delegate it to a peer, and so on. Because delegation is mediated by a central policy server, the system can enforce global security policies (e.g., revocation, least‑privilege constraints) while still allowing decentralized use of the session.
The third layer abstracts the transport mechanism. CEDAR works over both TCP and UDP, and the authors emphasize that UDP‑based secure channels are often ignored by other libraries. In CEDAR, once a session token is exchanged, the UDP endpoint can encrypt each datagram with the session key and attach a MAC, eliminating the need for a separate DTLS‑style handshake. This makes CEDAR suitable for low‑latency, high‑throughput scenarios such as real‑time telemetry, log streaming, or small‑message RPCs.
Performance experiments are presented using Condor‑HTC deployments and the US CMS (Compact Muon Solenoid) grid. Compared with a Kerberos‑based baseline, CEDAR reduces average connection latency by roughly 60 % because the majority of connections reuse an existing delegated session instead of performing a full authentication exchange. In UDP tests, the overhead of packet loss recovery drops to under 30 % of the baseline, thanks to the lightweight per‑packet MAC and the absence of a handshake. Most strikingly, when workers directly communicate using delegated sessions, the central authentication server receives virtually no traffic, and overall system throughput more than doubles.
From a security perspective, CEDAR periodically rotates session keys, and all tokens are signed with a public‑key infrastructure, protecting against man‑in‑the‑middle and replay attacks. The policy server can revoke tokens at any time, ensuring that compromised components cannot continue to use stale sessions. The UDP channel inherits the same confidentiality and integrity guarantees as the TCP channel, but without the latency penalty of a handshake.
In summary, CEDAR demonstrates that a clean separation of authentication, session, and transport, combined with a robust session‑delegation mechanism, can dramatically reduce authentication‑induced latency, improve scalability, and support both TCP and UDP in a unified security framework. The architecture offers a compelling blueprint for future cloud, grid, and edge computing platforms that must balance strong security guarantees with the performance demands of massive, geographically dispersed workloads.
Comments & Academic Discussion
Loading comments...
Leave a Comment