trusted computing for the grid

20
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Trusted Computing for the GRID Dirk Kuhlmann [[email protected]] Trusted Systems Lab, HPLabs, Bristol

Upload: liluye

Post on 23-Jan-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Trusted Computing for the GRID. Dirk Kuhlmann [[email protected]] Trusted Systems Lab, HPLabs, Bristol. Platform security concerns for GRID. Large number of dynamically managed nodes Reliably identify a particular node Get reliable information about runtime status - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Trusted Computing for the GRID

© 2004 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice

Trusted Computing for the GRID

Dirk Kuhlmann [[email protected]]

Trusted Systems Lab, HPLabs, Bristol

Page 2: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 2

Platform security concerns for GRID

• Large number of dynamically managed nodes− Reliably identify a particular node− Get reliable information about runtime status− Protect user data and programs

• OS and hardware in GRID scenarios− Commercial ‘off the shelve’ elements to save costs− Subjected to COTS vulnerabilities− ‘Script kiddies’ and worms don’t care whether they attack

a private platform or a GRID node

• Trusted platforms− Next-generation hardware and software

Page 3: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 3

Trusted Nodes as building blocks for Trusted Infrastructure

• Are the IT systems on my network the ones I intended to be part of the infrastructure?

• Is the software and configuration on IT systems what they are intended it to be?

• Is the software I deploy on my IT systems going to behave as intended?

Trusted Computing could become a foundational component to address the first two question.

TC hardware is no silver bullet! • Secure product development must address the

third issue.• Main challenges concern software, in particular

OS!

Page 4: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 4

Trusted Computing and HPLabs

• Trusted Computing Platform Alliance - TCPA− Founded October 1999− Compaq, HP, IBM, Intel, Microsoft− Created Embedded Security chip Specification v1.1b

• Trusted Computing Group - TCG− Founded April 2003− Build on TCPA− Expands Trusted Computing to other platform categories

and infrastructure

• HPLabs held HP’s Technical Committee chair for TCPA and now for TCG.

Page 5: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 5

Trusted Computing evolution

TPM Hardware

availability

Tier 0

HW Platform

Root-of-Trust

TC Operating

Environment -

Chain-of-Trust

Tier 1TC Apps –

Enterprise,

Biz. Critical,

Other

Tier 2

Tier 3

Trusted

Ecosystems /

GRID

Increased in

tegration

Page 6: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 6

The Trusted Platform Module - TPM -

• Trusted Computing builds upon a TPM hardware Root of Trust. Think: smartcard-like hardware component embedded into the platform

random numbergeneration

Non-volatileMemory

Processor Memory

asymmetric keygeneration

signing andencryption

power detectionclock/timer

I/O

HMAC

hash

Available in D530 series desktops and nc4010, nc6000, nc8000, and nw8000 notebooks

Page 7: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 7

Main value-proposition for GRID today: platform authentication

• With Trusted Computing Platforms, network resources can be restricted for access from approved devices as well as approved users

• Access granted to devices authenticated using the Trusted Platform Module (TPM – or Embedded Security Chip)

•To grant access to sensitive applications and services

•To control access to file servers and databases•To control access from peers or remote clients

through VPN and segment portions of the network

Page 8: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 8

The VPN example

Corporate Corporate GatewayGateway

Corporate Corporate GatewayGateway

Authenticates user AND Authenticates

Platform as Corporate IT-maintained

platform

Authenticates user AND Authenticates

Platform as Corporate IT-maintained

platform

Remote Employee

InternetISP

Resources

Establish encrypted channel

Databases Services

and/or

TC-enabled

Page 9: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 9

Authentication of users and devices

User Authentication Device Authentication

+

Trusted Computing

• Creates a Trusted Entity on the network

− Provides enhanced network rights, roles, and responsibility− Can be introduced with no disruption to existing IT infrastructure− allows IT managers to dynamically assign granular access control

• The device can also now be used as an authentication factor with:− Ease of Use – for the mobile professional− Reduced Total Cost of Ownership – for the IT department

Page 10: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 10

Value proposition for GRID tomorrow: trustworthiness of nodes

• Research / Development

TPM Hardware

availability

Tier 0

HW Platform

Root-of-Trust

TC Operating

Environment -

Chain-of-Trust

Tier 1TC Apps –

Enterprise,

Biz. Critical,

Other

Tier 2

Tier 3

Trusted

Ecosystems

Page 11: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 11

Trusted Node Requirements• Allow for device authentication• Monitor software integrity during boot-up

and runtime• Keep node alive and manageable• Support standard operating systems

• Current operating systems:− Integrity measurements as such do not enhance

security− Typically not geared towards ‘keep alive’

Page 12: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 12

Generic vs. hosted OS

Virtualization & Mgmt

Hardware (CPU, Disks, Network etc.)

Windows / Linux

Applications

Host OS options:• UM Linux • Micro / Exokernels• Paravirtualization

(Xen)• VMware / Plex86

TPM

Secuity enhanced OS (Windows / Linux)

Applications

• SE Linux • Bastille• Trustix, … • Windows NGSCB?

Hardware (CPU, Disks, Network etc.) TPM

Page 13: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 13

Chain of trust: TPM + hardened OS• List of trusted drivers, libraries, binaries, config, policies • Intercept syscalls open(), exec() etc• OS monitor checks memory image for each ‘trusted’ file

− Alternative: check complete boot file system image

• Policy: no further LKM-loading after trusted boot-up

• OS locked down: restrict raw disk /memory access etc.

• Fine grained OS policy to constrain max. possible damage− Compartments: essentially ‘sandboxing’ at user/process group level− Processes subjected to group-specific I/O and IPC policy− No visibility of processes of other compartments, chroot’ed− List of allowed ‘from/to’ addresses for networking

Page 14: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 14

TPM + hardened host OS for UM-Linux

• Use hardened OS as host OS− Host OS integrity check supported by TC hardware− Guest OS integrity checked by trusted SW in host OS

• think tripwire

• Guest OS launched inside host OS compartment− Guest OS ‘inherits’ compartment rules− network policy enforced outside the guest OS− can be restricted further, e.g. by netfilter on guest OS

• Option: dedicated hosted instances − packet filtering, firewall local to platform or guest OS− monitor, audit, report

Page 15: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 15

Challenges• Weak TC notion of ‘expected behaviour’

− SW integrity checking (essentially signed binaries)• Could be extended to binary + policy

− No notion of actual runtime behaviour• Borrow concepts: anomaly detection, proof carrying code• Further extension: runtime + policy + runtime signature• ‘Contractual Programming’? ‘Commpacts’?

• Management overhead: is it worth it?• Main concern: size of Trusted Computing

Base− Huge TCB for User Mode Linux scenario− Who does the validation for OSS? − Favours microkernel/virtualization layer, minimal

code base

Page 16: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 16

A TCG/Virtualization Artifact

Secure Virtualization Layer

Hardware (CPU, Disks, Network interfaces etc.)

Windowsor Linux

Applications

Windowsor Linux

Applications

TPM

Trusted Infrastructure Interface (TII)

RptgAgent

+ TCG functionality

Windowsor Linux

Applications

SoftTPM

SoftTPM

SoftTPM

Isolated processing environments

Page 17: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 17

Accountability SystemTimestamp

service

Trust Instrumentation: TCG and Secure Audit

AutomatedTest

Results

CERTVuln.

SWActivityreport

Systemconfig.report

ProcessReports …

TCGrooted

reporting

TCGrooted

reporting

TCGrooted

reporting

ExternalServiceagent probe sensor

Query: show meall patching eventson my service

Page 18: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 18

Trusted Virtualization Layer: Proprietary or Public/Open?

• There is a lot of effort going into proprietary solutions, esp. Windows NGSCB …

• So far, little complementary efforts in the Open Source field− General scepticism about Trusted Computing approach− Problem space beyond ‘typical’ OSS developer community

• Controversial discussion about OSS security in general

• Co-ordinated effort for Open Source is necessary− International approach− Academia, industry, and OSS communities− Validation as important as design & implementation !

Page 19: Trusted Computing for the GRID

Sep 15, 2004 GGF12 Security WS - Sep 20, 2004 - Trusted Computing & Grid 19

Conclusions• Today’s TCG hardware can be the stepping stone for

innovative security capabilities.

• Trusted Computing is a journey and we are seeing the first technology components appear on the market

• It will be a long and difficult way towards trusted GRID nodes and infrastructure. The main challenges are in the area of software: operating systems and management.

• Trustworthiness requires peer-review, replicable validation: Open Trusted Computing

Page 20: Trusted Computing for the GRID

HP logo