1
The Pump: 10 Years of Covertness
Myong H. Kang Ira S. Moskowitz Stanley Chincheck
Center for High Assurance Computer Systems
US Naval Research Laboratory Code 5540 Washington, DC mkang@itd.nrl.navy.mil
The Pump: 10 Years of Covertness Myong H. Kang Ira S. Moskowitz - - PowerPoint PPT Presentation
The Pump: 10 Years of Covertness Myong H. Kang Ira S. Moskowitz Stanley Chincheck Center for High Assurance Computer Systems US Naval Research Laboratory Code 5540 Washington, DC mkang@itd.nrl.navy.mil 1 A Brief History Started in 1993
1
US Naval Research Laboratory Code 5540 Washington, DC mkang@itd.nrl.navy.mil
2
!
Started in 1993 addressing data replication from Low database to High database
–
reliable, secure communication,” Proceedings of the First ACM Conference on Computer and Communications Security, 1993
!
Wanted to replace XTS-200 !
Network Pump algorithm was developed in 1995
!
Hardware version of the Pump
–
Completed January 2004 by NRL 5540
!
Navy Type accredited
–
As a critical security component of a cross-domain solution
–
Installed in various DoD facilities
!
About 60 in use
!
$3K for DoD customers !
Many papers later
–
US Patent filed, Navy Case #84,150, 25 July 2003
–
Applied for international rights
–
Trademarked “Network Pump™” name
!
17.5"W x 1.75"H x 10.5"D
!
19” rack mount
!
Ethernet 100BaseT interface
3
! Assurance
– Simple and easy to understand to facilitate accreditation – Protocol neutral
! Reliability
– No loss of messages – No duplication of messages
! Performance
– No reduction of data transfer rate due to security reasons
4
! Covert channel
– Reduce covert channel capacity as much as possible
! Fairness
– Fair rates among many senders and many receivers
! Denial of service attack
– Resist denial of service attacks
5
Low system
Low application Low wrapper
Low system
Low application Low wrapper Non-volatile buffer
Pump High system
High wrapper High application
High system
High wrapper High application
Data Stochastic ACK Data ACK Low LAN High LAN
6
! The Pump’s confidentiality properties depend solely on the Pump
–
Separates MLS functions from other functions
–
Wrappers make the Pump a generic device that is independent of a specific application
! Provide ACKs to a sender - Reliability ! Provide non-volatile buffer - Reliability
–
Decoupled Low ACKs from High ACKs - Covert Channel
–
Low ACKs are stochastic ACKs based upon a moving average of the past m High ACK times - Performance
7
Output buffer 1 Output buffer J
THP1 THPJ
Trusted Low Process
I{ I{ J{ J{
. . . . . .
ROUTING link1 linkI
. . . .
Receiver 1 Receiver I scheduler scheduler
8
! Share output buffers among different sessions -
! Acting as a router between receiving buffers and
– Round robin scheme - fairness and denial of service attack – Fair size - keep the queue length at a certain level - covert
9
9
Dual Port RAM (Bypass Channel) High LAN Interface Low LAN Interface Administrator Interface Power Interface
VCC_12 VCC_3.3 VCC_RAM Reset Power_Fail
8
High RAM Security Monitor High EEPROM Low RAM Low EEPROM
High Microprocessor Low Microprocessor
High Ethernet Interface Serial Interface Power & Reset Control Battery Low Ethernet Interface
Control
10
! Provides an interface to an administrator workstation
– Specify Low and High IP addresses and port numbers for
! Equipped with a built-in backup battery - Reliability
– Power failure: All messages in the volatile RAM will be
– Pump start up: All undelivered messages will be restored to
11
!
Cynicism in Trusted Database Systems,” in Biskup, J., M. Morgenstern, and C. E. Landwehr, eds. Database Security, VIII: Status and Prospects. IFIP Transactions A-60, Elsevier Science B.V., Amsterdam, 1994.
!
Information Technology Security Symposium, 2000.
!
results of covert channel limitation in one-way communication systems,” Network and Distributed System Security, 1997.
!
“Owl Computing Data Diode,” Common Criteria Security Target (EAL2), http://niap.nist.gov/cc-scheme/st/ST_VID4000-ST.pdf
!
US Patent 5,703,562, Method for Transferring Data from an Unsecured Computer to a Secured Computer, C.A. Nilsen Dec 30, 1997.
!
12
!
Transactions on , Volume: 42 , Issue: 1 , Jan. 1996.
!
Paper Award: Bits through Queues,'' IEEE Information Theory Society Newsletter vol. 49, no. 4, Dec. 1999.
!
and Processes to Certif Component: The NRL Pump, Naval Postgraduate School Monterey CA, March 2003.
!
Evaluation: Trading QoS with Covert Channel Bandwidth” to appear: SAFECOMP 2004.
!
technical report 2004, http://mefisto.web.cs.unibo.it/PubblSedeC0.html
!
13 !
communication,” Proceedings of the first ACM Conference on Computer and Communications Security, 1993.
!
IEEE-IMS Workshop on Information Theory and Statistics, Alexandria, VA, 1994.
!
IFIP WG11.3 Workshop on Database Security, NY, August 1995.
!
Application,” Proceedings of the 11th Annual Computer Security Applications Conference, pp.89 – 98,1995.
!
M.H. Kang and I. Moskowitz, “A data Pump for communication,” NRL Memorandum Report, 5540-95-7771, 1995.
!
IEEE Computer Society Symposium on Research in Security and Privacy. May 1995.
!
14
!
NRL Pump Prototypes,” 12th Annual Computer Applications Security Conference 1996.
!
Software Engineering, vol. 22, no. 5, 1996.
!
NRL Pump,” 2nd IEEE High-Assurance System Engineering Workshop (1997). IEEE Computer Magazine, Vol. 31, No 4, 1998.
!
US Patent application, 10/627,102, Navy Case #84,150, July 25, 2003.
15
! Bridge funding: Transitioning the product from
! Patient and flexible customers: Customers whose
! Perseverance: The quality that the researchers and