mikro sina
play

Mikro-SINA Bastei's stacked policies Overlay window management - PDF document

So far ... Faculty of Computer Science Institute for System Architecture, Operating Systems Group Basics Device Drivers Real time Naming Secure Systems Resource Management Stefan Kalkowski Virtualization / Legacy


  1. So far ... Faculty of Computer Science Institute for System Architecture, Operating Systems Group • Basics • Device Drivers • Real time • Naming Secure Systems • Resource Management Stefan Kalkowski • Virtualization / Legacy Container • Secure Systems Dresden, 2008-01-08 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 2 von 39 Outline • Secure Systems: ● Detailed example: Mikro-SINA ● Definitions ● Security policies Mikro-SINA ● Bastei's stacked policies ● Overlay window management ● Demo TU Dresden, 2008-01-08 MOS - Secure Systems Slide 3 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 4 von 39 Secure Internet Network Architecture SINA Box • VPN based security architecture by 'Bundes- • Minimized & hardened Linux amt für Sicherheit in der Informationstechnik' • IPSec and PKI • Intrusion detection & response • Complex real world scenario TU Dresden, 2008-01-08 MOS - Secure Systems Slide 5 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 6 von 39

  2. Linux complexity Project Mikro-SINA • Linux is complex! • Goals: ● Reduce Trusted Computing Base of VPN • SLOC for kernel 2.6.18 gateway ● All: 4.983.723 ● Enable high level evaluation (e.g.: Common ● Architecture specific: 817.880 Criteria) ● x86 specific: 55.463 • Objectives: ● Driver code: 2.365.256 ● Confidentiality and integrity of sensitive ● Common: 1.800.587 network data inside the VPN • Running kernel > 2 millions lines of code • Exploit microkernel features • Minimized & hardened version > 500.000 LOC TU Dresden, 2008-01-08 MOS - Secure Systems Slide 7 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 8 von 39 IPSec – the heart of VPN security Easy approach • IPSec is a protocol suite for securing the • Use paravirtualized L4Linux as a tool Internet protocol • Identify the security relevant parts in the • Authentication header insecure application and separate them ● Guarantees integrity Application • 'Viaduct' is used for authentication, key and authentication management and en- and decryption TCP/UDP • Encapsulating Security L 4 Linux L 4 Linux Payload IP ● Also confidentiality TCP/IP IPSec TCP/IP „Viaduct“ • Two different modes IPSec IPSec ● Tunnel vs. transport Data Link Layer Fiasco Fiasco TU Dresden, 2008-01-08 MOS - Secure Systems Slide 9 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 10 von 39 Viaduct in details Fragmentation of IP packets • IP packets must be passed to the Viaduct • Encrypted IP packets get fragmented ● Use TUN/TAP driver in Linux to tunnel IP ● Problem for decryption • IP packets have to be unfragmented before they are passed to the Viaduct L 4 Linux TCP/IP μ-SINA μ-SINA Viaduct Gateway Gateway IP router IP router L4Linux Viaduct L4Linux Viaduct eth0 l4tun0 Fiasco TU Dresden, 2008-01-08 MOS - Secure Systems Slide 11 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 12 von 39

  3. Let Linux do the dirty work ... What about confidentiality? • Register new transport protocol • L4Linux is untrusted ● but handles encrypted and unencrypted data • IP stack will unfragment IP packets • Use a second L4Linux instance ● Each L4Linux instance drives its own ethernet L 4 Linux card exclusively AH/ESP TCP/IP Viaduct Internet LAN Viaduct L 4 Linux L 4 Linux eth0 l4tun0 eth0 eth1 Fiasco Fiasco TU Dresden, 2008-01-08 MOS - Secure Systems Slide 13 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 14 von 39 Mikro-SINA so far Mikro-SINA: Multi Level Security • 'Outer' L4Linux instance handles encrypted • Different security levels for data from different data only organizational levels • 'Inner' L4Linux instance handles unencrypted • Use an own L4Linux instance for each level, data and cannot communicate to the other that handle the unencrypted data instance or the 'outgoing' network device L 4 Linux Internet Viaduct LAN L 4 Linux L 4 Linux L 4 Linux Viaduct L 4 Linux L 4 Linux eth0 eth1 eth0 Fiasco Fiasco TU Dresden, 2008-01-08 MOS - Secure Systems Slide 15 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 16 von 39 Reduce untrusted code size Techniques • Do we need two L4Linux instances for a VPN • Fine grained isolation  Microkernel feature gateway?  Linux user level, process management,  Enables implementation of principle of least scheduling, file systems etc. are not necessary privilege • Use FLIPS (Flexible IP Stack): standalone • Minimize complexity of TCB for security TCP/IP stack relevant code  Split applications in security relevant and nonrelevant parts Viaduct  Use trusted wrappers (e.g.: Viaduct) FLIPS FLIPS  Minimize common code (microkernel approach) eth0 eth1 • Usage of legacy code Fiasco TU Dresden, 2008-01-08 MOS - Secure Systems Slide 17 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 18 von 39

  4. Nizza - security architecture • Beyond Mikro-SINA: greater vision Nizza Terms & Models Common secure platform TU Dresden, 2008-01-08 MOS - Secure Systems Slide 19 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 20 von 39 Secure system Policy and Mechanism Secure System * : Security Policy:  A secure system is a system that starts in an  A security policy is a statement of what is, and authorized state and cannot enter an what is not allowed.  e.g.: SELinux policy, pagetable, /etc/passwd unauthorized state. Security Policy * : Security Mechanism:  A security policy is a statement that partitions  A security mechanism is a method, tool, or the states of the system into a set of procedure for enforcing a security policy authorized, or secure, states and a set of  e.g.: Capabilities, paging hardware unauthorized, or nonsecure, states. * Matt Bishop: Computer Security – Art and Science TU Dresden, 2008-01-08 MOS - Secure Systems Slide 21 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 22 von 39 Formal security model: Bell-LaPadula Formal security model: Bell-LaPadula • Subjects and objects have a security label , • Example: Label L 1 : (Topsecret, {National}) consisting of a security level and category set dominates L 2 (Secret, {}) • A security label dominates another one, if its • Simple Security Condition: S can read O if S security level is greater or equal than the dominates O (no reads up) other one and its category set is a superset of • *-Property: S can write to O if and only if O the other one dominates S (no writes down) Top Secret {National,Foreign} Secret {National} {Foreign} Confidential {} Unclassified TU Dresden, 2008-01-08 MOS - Secure Systems Slide 23 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 24 von 39

  5. Bell-LaPadula summary More flexible security models • Information flow policy, that preserves • Type Enforcement  Subjects and objects have types confidentiality  Types can be compounded to other types • Very simple model, proof of model's security  Explicit rules state what types can access properties is also trivial (read, write) what other types • No integrity concerns in the model (use Biba) • Very general model • Problem: information flows only in one • In general: its more hard to prove specific direction security properties in such a policy  A lot of underlying system software (e.g. device drivers) has to be used by all different • SELinux is an example for TE in practice security levels  Mostly these parts are excluded from the model TU Dresden, 2008-01-08 MOS - Secure Systems Slide 25 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 26 von 39 SELinux Decompose security policies • Developed by the NSA • Szenario: Content Management System + typical web services • Based on Linux Security Modules (LSM) TCP/IP User User Web • Linux functionality leads to complex security Document Passwd SSL Stack Alice Bob Getty Store Auth Auth policy • Standard (NSA) policy Content Ethernet Intel 100 TPM 1000 Card Pro System  over 300 domains TCP/IP Mailserver Webserver DNS  ~ 50.000 rules Stack PCI Host LPC ATA Driver Controller Controller  Tools might help to keep the overview Audit DMZ • Problem: monolithic kernel leads to monolithic Device Manager reference monitor with one big policy inside Init TU Dresden, 2008-01-08 MOS - Secure Systems Slide 27 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 28 von 39 Decompose security policies Use Bastei sessions • Application specific policy stack • In Bastei every task dominates its children with respect to sessions outside the child's • Diverse security policy types can be combined own subtree TCP/IP User User Web Document Passwd SSL Stack Alice Bob Getty Store Auth Auth • Eases up multilateral security Grand- – Every organization unit can Child integrate its own policy Ethernet Intel 100 TE + TPM Roles 1000 Card Pro dominates first policy TCP/IP decision Mailserver Webserver DNS Stack Child 1 Child 2 ATA PCI Host LPC Controller Controller Driver dominates Audit iptables second policy just ACM decision do it! Init ACM TU Dresden, 2008-01-08 MOS - Secure Systems Slide 29 von 39 TU Dresden, 2008-01-08 MOS - Secure Systems Slide 30 von 39

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend