secure software distribution in an adversarial world

38
Secure Software Distribution in an Adversarial World @diogomonica

Upload: diogo-monica

Post on 16-Jan-2017

830 views

Category:

Software


0 download

TRANSCRIPT

Page 1: Secure Software Distribution in an Adversarial World

Secure Software Distribution in an Adversarial World

@diogomonica

🔐💾↔👹🌎

Page 2: Secure Software Distribution in an Adversarial World
Page 3: Secure Software Distribution in an Adversarial World
Page 4: Secure Software Distribution in an Adversarial World
Page 5: Secure Software Distribution in an Adversarial World
Page 6: Secure Software Distribution in an Adversarial World

source: edharrington.tumblr.com

Page 7: Secure Software Distribution in an Adversarial World

Isn’t HTTPS enough?

Page 8: Secure Software Distribution in an Adversarial World
Page 9: Secure Software Distribution in an Adversarial World
Page 10: Secure Software Distribution in an Adversarial World
Page 11: Secure Software Distribution in an Adversarial World

What about GPG?

Page 12: Secure Software Distribution in an Adversarial World
Page 13: Secure Software Distribution in an Adversarial World
Page 14: Secure Software Distribution in an Adversarial World
Page 15: Secure Software Distribution in an Adversarial World

3 months later…

Page 16: Secure Software Distribution in an Adversarial World
Page 17: Secure Software Distribution in an Adversarial World
Page 18: Secure Software Distribution in an Adversarial World
Page 19: Secure Software Distribution in an Adversarial World
Page 20: Secure Software Distribution in an Adversarial World
Page 21: Secure Software Distribution in an Adversarial World

“A software update system is secure if it can be sure that it knows about the latest available updates in a timely manner, any files it downloads are the correct files, and no harm results from checking or downloading files.”

- The Update Framework

Page 22: Secure Software Distribution in an Adversarial World

•Freshness •Signed collections •Key Hierarchy •Transparent key rotation •Threshold signing

Page 23: Secure Software Distribution in an Adversarial World

Freshness

Page 24: Secure Software Distribution in an Adversarial World

Freshness

Page 25: Secure Software Distribution in an Adversarial World

Signed Packages Signed Collection

Signed Collections

Page 26: Secure Software Distribution in an Adversarial World

Key Hierarchy

Page 27: Secure Software Distribution in an Adversarial World

Key Hierarchy

Page 28: Secure Software Distribution in an Adversarial World

Short Expiry

Long Expiry

Less Sensitive

More Sensitive

Key Hierarchy

Page 29: Secure Software Distribution in an Adversarial World

Transparent Key Rotation

Page 30: Secure Software Distribution in an Adversarial World

Transparent Key Rotation

offline

online

Page 31: Secure Software Distribution in an Adversarial World

Transparent Key Rotation

Page 32: Secure Software Distribution in an Adversarial World

Transparent Key Rotation

Page 33: Secure Software Distribution in an Adversarial World

Threshold Signing

Page 34: Secure Software Distribution in an Adversarial World

Threshold Signing

Page 35: Secure Software Distribution in an Adversarial World

Use The Update Framework (TUF)

theupdateframework.com

Page 36: Secure Software Distribution in an Adversarial World

Notary, an opinionated implementation of TUF

github.com/docker/notary

Page 37: Secure Software Distribution in an Adversarial World

When the going gets tough, get TUF going

Page 38: Secure Software Distribution in an Adversarial World

Thank you@diogomonica