proving confidentiality in a file system using disksec
play

Proving Confidentiality in a File System Using DiskSec (Poster #2) - PowerPoint PPT Presentation

Proving Confidentiality in a File System Using DiskSec (Poster #2) OSDI 18 Atalay Mert leri, Tej Chajed, Adam Chlipala, Frans Kaashoek, Nickolai Zeldovich MIT CSAIL Storage Systems Contain Confidential Data Users rely on the storage


  1. Proving Confidentiality in a File System Using DiskSec (Poster #2) OSDI ‘18 Atalay Mert İleri, Tej Chajed, Adam Chlipala, Frans Kaashoek, Nickolai Zeldovich MIT CSAIL

  2. Storage Systems Contain Confidential Data Users rely on the storage system to maintain their confidentiality. ● A file system will be used as a case study in this talk. 2

  3. Confidentiality in a File System ● Alice and Bob share a file-system on the same machine ● Bob tries to learn the content of Alice’s files Threat model: Bob can call the file-system interface and cannot bypass it. ○ can’t steal the disk ○ can’t read or write directly to the disk etc. 3

  4. Bugs May Leak Confidential Data File-systems are also subject to confidentiality bugs. Examples ● Crash can expose deleted data (ext4 - 2017) ● Anyone can change POSIX ACLs (NFS - 2016) ● Truncated data can be accessed (btrfs - 2015) ● Crash can expose data (ext4 - 2014) ● Anyone can change POSIX ACLs (btrfs, gfs2 - 2010) ● ... 4

  5. Approach: Formal Verification ● Write a specification that captures the desired behavior of the system. ● Prove that implementation satisfies the specification. ● As long as specification accurately captures the desired behavior, implementation details are irrelevant. ● We have verified file systems with correctness specifications (e.g. DFSCQ [SOSP’17]). 5

  6. Functional Specifications Do Not Ensure Confidentiality Functional specifications ensure many security properties. (e.g. no memory corruption, no disk corruption etc.) Example: Specification for readdir readdir can return entries in any order. readdir (...) ⇒ dir_a, dir_b /dir_a /dir_b dir_b, dir_a 6

  7. Functional Specifications Do Not Ensure Confidentiality def readdir(...) dirs = get_dirlist(...) ● Meets specification if (alice.txt file contains ‘a’) return sort(dirs) ● Leaks confidential data else return reverse_sort(dirs) Nondeterministic functional specifications allow breach of confidentiality. Confidentiality requires better specifications. 7

  8. State of the Art in Verifying Confidentiality Existing Systems ● seL4 [SSP’13] ● Ironclad [OSDI’14] ● CertiKOS [PLDI’16] ● Komodo [SOSP’17] ● Nickel [OSDI‘18] Above systems use non-interference for their confidentiality specifications. Non-interference does not allow any data exposure from Alice to Bob. 8

  9. Non-interference is Not Suitable for File System Confidentiality. ● File systems have discretionary access control ● File systems intentionally expose metadata. 9

  10. Contributions DiskSec Framework for proving confidentiality of storage systems. ● File-system confidentiality specification. ● Proof technique to track ownership of the data. ● DiskSec implemented and proven in Coq Proof Assistant. Evaluation ● SFSCQ file system: extension of DFSCQ with confidentiality theorem ● Confidentiality for simple app on top of SFSCQ 10

  11. Bob Cannot Infer Alice’s Confidential Data World 1 World 2 Alice: Alice: write(f, b) write(f, a) Data is confidential: observes same results Bob Bob 11

  12. Confidentiality Means Other Users See Same Thing Regardless of Your Data World 1 p s 1 s’ 1 ) a ( e Bob t i r w Confidentiality ret 1 s requires that write(b) p s 2 s’ 2 ret 1 = ret 2 Bob ret 2 World 2 Two states are equivalent with respect to a user ( ≅ user ), if all the data visible to that user is the same in both states. 12

  13. Our Confidentiality Specification: Data Non-interference State Non-interference Return Non-interference p syscall s 0 s 1 s 2 Bob ret 1 = ≅ Bob ≅ Bob ret 2 p syscall s’ 0 s’ 1 s’ 2 Bob 13

  14. Data Non-interference is a Good Confidentiality Specification for File Systems Data non-interference ● allows discretionary access control, ● allows exposing of metadata, ● forbids exposing of user data ○ even indirectly (e.g. readdir) 14

  15. How can We Prove Data Non-interference? Data non-interference require more complicated proofs than functional correctness. ● Require reasoning about behavior of two executions. Insight: File systems mostly does not inspect user data. ● Suffices to reason about where user data is accessed in one execution. 15

  16. Our Approach: Sealed Blocks ● Pretend that all disk blocks are logically sealed. ● Function needs to request an unseal to access the data content. ● Functions can be analyzed to prove that they do not unseal user data. 16

  17. Standard Disk Infrastructure read(a: addr) -> data write(a: addr, b: data) File system implementation Disk data data data 17

  18. DiskSec Infrastructure owner sealed block ( sblock ) data read(a: addr) -> sblock read(a: addr) -> data write(a: addr, b: sblock) write(a: addr, b: data) File system implementation seal(d: data, u: user) -> sblock unseal(b: sblock) -> data Sec logical disk Disk unseal owner trace owner owner owner u 1 , u 2 , ... data data data 18

  19. How to Use DiskSec? 1. Developer instruments his code with seals, unseals and access control checks. Standard Implementation DiskSec Implementation def read(f,...) def read (f,...) data = read_disk(f,...) if (can_access(f)) return data sealed_data = read_disk(f,...) data = unseal(sealed_data) return data else return error 2. Developer proves that a certain property holds for the unseal trace of the implementation. 19

  20. Sealed Blocks Simplify Confidentiality Proofs Unseal Public Function only unseals data accessible to every user . Unseal Public ➙ Data Non-interference Unseal Secure Function only unseals data accessible to the current user Unseal Secure ➙ Return Non-interference In this case, state non-interference needs to be proven separately. 20

  21. DiskSec Summary ● Provides infrastructure for access control in storage systems. ● Formalizes data non-interference as a confidentiality specification. ● Simplifies proof effort by reducing data non-interference proofs to unseal trace proofs. 21

  22. Applying DiskSec: SFSCQ Overview ● Based on DFSCQ [SOSP’17] ● Supports multiple users ● Simplified permission model ○ All metadata, including file names, are public. ○ File contents may be public or private. ○ File owner is set upon creation. ● Fully implemented and verified in Coq Proof Assistant 22

  23. Evaluation ● Did we prove DFSCQ satisfies data non-interference? ○ Not completely. ○ Needed to remove an advanced feature. ● Is performance the same as DFSCQ? ○ SFSCQ code = DFSCQ code + access control checks ● How much effort did it require? ○ Took one author ~3 months 23

  24. Conclusions ● Correctness specifications are not enough for confidentiality. ● Data non-interference is a suitable confidentiality specification for file systems. ● We designed and implemented DiskSec, a framework for confidentiality proofs for storage systems. ● We implemented SFSCQ, the first file system with machine-checkable confidentiality proofs, using DiskSec. https://github.com/mit-pdos/fscq/tree/security 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend