enabled cloud
play

Enabled Cloud Anton Burtsev David Johnson, Josh Kunz, Eric Eide, - PowerPoint PPT Presentation

CapNet: Security and Least Authority in a Capability- Enabled Cloud Anton Burtsev David Johnson, Josh Kunz, Eric Eide, Jacobus Van der Merwe University of California, University of Utah Irvine Modern clouds are vulnerable Endpoints are


  1. CapNet: Security and Least Authority in a Capability- Enabled Cloud Anton Burtsev David Johnson, Josh Kunz, Eric Eide, Jacobus Van der Merwe University of California, University of Utah Irvine

  2. Modern clouds are vulnerable

  3. Endpoints are inherently vulnerable Linux Kernel Vulnerabilities by Year 400 350 300 250 200 150 100 50 0 2009 2010 2011 2012 2013 2014 2015 2016 2017

  4. Endpoint

  5. Broad network authority Cloud network is the main attack amplifier

  6. Legacy network-isolation primitives • Global tenant-wide access control rules • E.g., security groups • Lack of mutual isolation • Lack of decentralized access control • Need to trust a third party Ambient authority

  7. Capability-enabled network

  8. CapNet Architecture

  9. Threat model • We trust • Cloud provider infrastructure • Network switches • SDN controller • Hypervisors • Cloud software stack • Hosts are malicious • Virtual and physical hosts on the network • Providers of third-party cloud services

  10. CapNet Architecture • Software defined network (SDN) • CapNet runs as an SDN controller application • Tracks resources of the network • By default nodes are completely isolated • No flows are allowed

  11. Objects and capabilities

  12. CapNet Architecture • On the host, capabilities are just 64-bit numbers • Have no meaning outside of the host • CapNet associates a Node object with each host on the network • Unique {switch, port} pair • Capabilities are resolved through Node’s CSpace into pointers to other objects

  13. Objects CapNet Capability graph Physical resources

  14. Nodes • Node is "born" with one special capability, rp0 , connecting it to creator

  15. RendezvousPoints • RendezvousPoints allow Nodes exchange capabilities • Capability derivation trees (CDT)

  16. Flows • A unidirectional communication channel • The ability to send packets to a particular network endpoint

  17. Grant invoke(cap c, method m, args) Grant.grant(cap c) • Support for legacy capability-oblivious hosts • Passive administration

  18. Grant invoke(cap c, m, args) Grant.grant(cap c) Grant.take(capability_id cap_id)

  19. Grant invoke(cap c, m, args) Grant.grant(cap c) Grant.take(capability_id cap_id) grant.create(Flow)

  20. Convenient network programming • Example: connecting two nodes A and B 1. connect (cap gantA, cap grantB) 2. flowA = grantA.create(Flow) 3. flowB = grantB.create(Flow) 4. grantA.grant(flowB) 5. grantA.grant(flowA)

  21. Decentralized Authority and Collaboration

  22. Reset • Reset the node to a clean, isolated state irrespective of its prior state and ownership

  23. Reset • Tracking and cleaning authority of the node

  24. Reset preserves ownership

  25. Recursive isolation of capability graphs

  26. Membranes

  27. Membranes

  28. Membranes

  29. Membranes

  30. SealersUnsealers FAIL!

  31. SealersUnsealers go through membranes

  32. Protocols of Secure Collaboration

  33. Secure provider protocol

  34. Recursion

  35. Trees and general graphs • Membranes and reset allow the construction of trees in capability graphs

  36. Trees and general graphs • SealerUnsealer enable cloud topologies that are general graphs

  37. Joint computation protocol

  38. CapNet in OpenStack

  39. Thank you! Anton Burtsev aburtsev@uci.edu Paper: SoCC’17 Source: https://gitlab.flux.utah.edu/tcloud/capnet Test drive in CloudLab: https://www.cloudlab.us/p/TCloud/OpenStack-Capnet

  40. Backup slides

  41. CapNet Objects Physical resources • Node – hosts on the network • RendezvousPoint – exchange of capabilities • Flow – network flows Capability graph • Grant – support for unmodified hosts • Membrane – transitive isolation of capability graphs • SealerUnsealer – secure transport of capabilities

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend