distributed security infrastructure
play

Distributed Security Infrastructure Makan.Pouzandi@Ericsson.ca - PowerPoint PPT Presentation

Distributed Security Infrastructure Makan.Pouzandi@Ericsson.ca Ericsson Research Open Systems Lab Montral Canada June 26 , 2002 Rev PA1 2002-07-05 1 Ericsson Canada Agenda Context Security in Telecom business Current


  1. Distributed Security Infrastructure Makan.Pouzandi@Ericsson.ca Ericsson Research Open Systems Lab Montréal – Canada June 26 , 2002 Rev PA1 2002-07-05 1 Ericsson Canada

  2. Agenda • Context • Security in Telecom business • Current situation • Need for a new software • DSI Goals and functionality • DSI overview • Security services Rev PA1 2002-07-05 2 Ericsson Canada

  3. Context • Target application: soft real time applications • High Availability: 99.999% uptime • Clustered servers • Exposed to the Internet • Providing services to different operators • Running untrusted third-party software • Software configuration evolves slowly over time: no wild software installations Rev PA1 2002-07-05 3 Ericsson Canada

  4. Why Security in Telecom business? Rev PA1 2002-07-05 4 Ericsson Canada

  5. Change in the market: all-IP-networks Yesterday Today Applications & Content Services Management & Support Service Control Service Capabilities Data/IP Networks Multi-Service PSTN/ISDN IP Backbone PLMN CATV Network Broadband Wireless Narrowband Access Access Access Clients Access Transport & Switching Networks Rev PA1 2002-07-05 5 Ericsson Canada

  6. The need for a new approach Rev PA1 2002-07-05 6 Ericsson Canada

  7. “Distributed Systems Require Distributed Security” Hartman, Flinn, Beznosov, Enterprise Security with EJB and CORBA Rev PA1 2002-07-05 7 Ericsson Canada

  8. Challenges in Distributed security • Implement coherent distributed security – Many layers to fit together : Applications, Middleware, OS, Hardware, Network … – Heterogeneous environment: variety of Hardware, Software: OS, Middleware, Networking technologies • Integration of different security solutions from potentially different vendors … • System management – If manually managed, it may lead to misconfigurations and inconsistencies Rev PA1 2002-07-05 8 Ericsson Canada

  9. Patching versus Coherent framework • Precise place to intervene when it is necessary to increase performances or the needs for the system change according to the client or legal issues • Coherent solutions evolve over time; patching does not! Intrusions Figure from “Building Secure Software”, Viega-McGraw Disclosure Patch Scripts Out Released Time Rev PA1 2002-07-05 9 Ericsson Canada

  10. Benefits of a coherent framework • Abstracting the underlying security algorithms and mechanisms • Reducing development time • Minimizing the risk of creating subtle, but dangerous security vulnerabilities by reusing security tested software • Maximize our investment for security mechanisms Rev PA1 2002-07-05 10 Ericsson Canada

  11. Security in different types of Clusters Traditional Clusters Carrier Class Clusters • Target application: soft real • No real time applications, time, • Security policy based upon login • No possible security policy and passwords, upon traditional login, password, • Running for short period of time (days) before each reboot, • Running for a very long time (months) under the same • No pre-emptive security. login without rebooting, • Fine grained security policy based on processes, • Pre-emptive security. Rev PA1 2002-07-05 11 Ericsson Canada

  12. Access control Approach on cluster computing No Security check on • Current security approach in Node 2 Process a, but on Process b cluster computing: Security Manager – Generally based on user Process b privileges (login, password) – Life time: a session of several hours ? – Scope: limited range of operations according to the application’s Access Request nature Node 1 • Our target telecom application: – One user only Security Manager – Life time: months if not years Process a – Scope: wide range of operations, from upgrading software to managing information in database Rev PA1 2002-07-05 12 Ericsson Canada

  13. Existing solutions • Many existing security solutions exist: – As external security mechanisms to the servers such as firewalls and Intrusion Detection Systems – As part of servers such as Integrity checks and some mechanisms to enhance security as a part of OS… • However, there are few efforts to make a coherent framework for enhancing security in a distributed system Rev PA1 2002-07-05 13 Ericsson Canada

  14. Distributed Security Infrastructure Goals and Functionality Rev PA1 2002-07-05 14 Ericsson Canada

  15. Project Goals • Design an architecture that: – Supports security mechanisms to protect the system against External attacks originating from Internet, Internal attacks (Break through a node in the cluster, O&M security, Intranet attacks ..) – Accommodates current and future needs – Provides mechanisms for detecting and reacting to breaches – Targets Carrier Class Clustered Server • Architectural Requirements: – Scalable and Flexible – Does not provide a single point of failure – Does not impose any performance bottlenecks – Provide ease of development Rev PA1 2002-07-05 15 Ericsson Canada

  16. DSI characteristics • Coherent framework: coherent through different layers of heterogeneous hardware, applications…. • Process level approach: security based on individual processes • Pre-emptive security:changes in the security context will be reflected immediately • Transparent key management: cryptographic keys ecurely stored and managed • Dynamic security policy: run time changes in security context and policy Rev PA1 2002-07-05 16 Ericsson Canada

  17. What we do vs. what we don’t do Do Do Not • Design and implement a • Invent new algorithms nor new coherent framework for the protocols for cryptography, security needs of a cluster authentication or else running a soft real time application • Re-use as much as possible existing algorithms and protocols (COTS) • Adapt current technologies to fit our needs and environment (soft real time) Rev PA1 2002-07-05 17 Ericsson Canada

  18. DSI Functionality • Access control: resources each subject should be able to access and prevent the illegal accesses • Authentication: verifies that the principals are who they claim to be. • Auditing: provides a record of security relevant and allows monitoring of the subject in the system. • Confidentiality and Integrity for communications • Security Management Rev PA1 2002-07-05 18 Ericsson Canada

  19. Distributed Security Infrastructure Overview Rev PA1 2002-07-05 19 Ericsson Canada

  20. Distributed Architecture Secondary Security Server Node 1 Node 2 Node 3 Security Server Node Proc987 Proc123 Service Provider Kernel Security Service SS SM SM SM Security Broker DSI Data Traffic SM: Security Manager SS: Security Server Rev PA1 2002-07-05 20 Ericsson Canada

  21. Security Services Security Context Repository Security Policy Key Repository Security Context Security Manager Key Management Auditing Access Control Authentication Integrity Service Service Service Service Rev PA1 2002-07-05 21 Ericsson Canada

  22. Service based (2) • Separation between API and Implementation – Implementation changes, security patches do not affect the system • Flexibility – Easily change, update, remove services based on needs, legal issues • Evolution over time Rev PA1 2002-07-05 22 Ericsson Canada

  23. Distributed Security Policy (DSP) • Express a coherent security vision (security policy) through out all the cluster • Local security policy: – Initially integrated to the secure boot software – Maintained and updated by the security server through security broker • Based on domain enforcement • Define communication type between processes: secure, not secure, authenticated, encrypted… Rev PA1 2002-07-05 23 Ericsson Canada

  24. Distributed Security Policy Security Server Node Node 1 Node 2 Node 3 Proc987 Port 21 Logical Access Dist Sec Policy Dist Sec Policy Dist Sec Policy Kernel SS SM SM SM Security Broker Data Traffic SS: Security Server SM: Security Manager Rev PA1 2002-07-05 24 Ericsson Canada

  25. DSI Core Security Server, Security Manager and Security Communication Channel Rev PA1 2002-07-05 25 Ericsson Canada

  26. Development Environment • Kernel 2.4.17 • LSM patch 2.4.18 • Red Hat 7.2 • C/C++ • GCC 2.96 Rev PA1 2002-07-05 26 Ericsson Canada

  27. Secure Boot • Secure Boot: provides us with Distributed Trusted Computing Base (DTCB) • Kernel at secure boot is small enough to be thoroughly vulnerability tested • Use of digital signatures and a local certification authority will prevent DTCB from malicious modifications Rev PA1 2002-07-05 27 Ericsson Canada

  28. Secure Boot Status • Development software kit done • Download boot images from the network • Checks RSA signatures on boot images • Executes the boot image • Kit based on – Network-Boot kit • boots from LAN • runs Linux • diskless (RAM based) – Two-kernel Monte – OpenSSL 0.9.5 Rev PA1 2002-07-05 28 Ericsson Canada

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend