Securing OpenStack with Intel Trusted Computing OpenStack Summit Atlanta 2014 12 May 2014 Christian Huebner Cloud Architect

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Vpn-info.com.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
11 HDS TECHNOLOGY DEMONSTRATION Steve Sonnenberg May 12, 2014 © Hitachi Data Systems Corporation All Rights Reserved.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
System and Network Security Practices COEN 351 E-Commerce Security.
Trusted Disk Loading in the Emulab Network Testbed Cody Cutler, Mike Hibler, Eric Eide, Rob Ricci 1.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Architecture overview 6/03/12 F. Desprez - ISC Cloud Context : Development of a toolbox for deploying application services providers with a hierarchical.
ANDROID PROGRAMMING MODULE 1 – GETTING STARTED
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
VMware vCenter Server Module 4.
Adaptive Server Farms for the Data Center Contact: Ron Sheen Fujitsu Siemens Computers, Inc Sever Blade Summit, Getting the.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
Linux Operations and Administration
Esri UC 2014 | Demo Theater | Using ArcGIS for Server in the Microsoft Azure Cloud Nikhil Shampur.
Additional SugarCRM details for complete, functional, and portable deployment.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.

Module 13: Configuring Availability of Network Resources and Content.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Week #7 Objectives: Secure Windows 7 Desktop
Kenichi Kourai (Kyushu Institute of Technology) Takuya Nagata (Kyushu Institute of Technology) A Secure Framework for Monitoring Operating Systems Using.
Trusted Computing Platform Alliance
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Scott Drucker, Systems Engineer Migrating to Microsoft Vista with WinINSTALL.
Using Encryption with Microsoft SQL Server 2000 Kevin McDonnell Technical Lead SQL Server Support Microsoft Corporation.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
Windows 2000 Certificate Authority By Saunders Roesser.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Reducing Trust Domain with TXT Daniel De Graaf. TXT overview Original TPM – Static Root of Trust – BIOS, all boot ROMs, bootloader, hypervisor, OS TPM.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Security Vulnerabilities in A Virtual Environment
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Linux Operations and Administration
Linux Operations and Administration
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
The Linux Operating System R.Bigelow. What is an Operating System An operating system is a collection of programs that manage a computer's resources.
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ServerTemplate TM Deep Dive: Configuration for Multi-Cloud Environments Tim Miller Sr. Director ServerTemplate TM Development Cary Penniman Sr. Software.
ClickOnce Deployment (One-click Deployment)
ArcGIS for Server Security: Advanced
Andrea Chierici Virtualization tutorial Catania 1-3 dicember 2010
Chapter 6: Securing the Cloud
Operating System & Application Software
Trusted Computing and the Trusted Platform Module
Trusted Computing and the Trusted Platform Module
Chapter 2: System Structures
Drupal VM and Docker4Drupal For Drupal Development Platform
Oracle Solaris Zones Study Purpose Only
OpenStack Ani Bicaku 18/04/ © (SG)² Konsortium.
Drupal VM and Docker4Drupal as Consistent Drupal Development Platform
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
SAP R/3 Installation on WIN NT-ORACLE
Sai Krishna Deepak Maram, CS 6410
Bruce Maggs (with some slides from Bryan Parno)
Bruce Maggs (with some slides from Bryan Parno)
ClickOnce Deployment (One-click Deployment)
Lecture 10 review Booting sequence in Brief
Presentation transcript:

Securing OpenStack with Intel Trusted Computing OpenStack Summit Atlanta May 2014 Christian Huebner Cloud Architect

Overview Using established server protection to protect cloud infrastructure with existing tools

Section 1 The Foot View

The Challenge Cloud infrastructure is vulnerable Compromised cloud infrastructure not detectable from Guest OS Protect the infrastructure

Established Server Protection Intel Trusted Computing (TXT) measures system components during boot BIOS/UEFI Boot loader OS startup stores metrics in hardware device (TPM) provides verification with a remote server

How Does This Apply To The Cloud? Cloud infrastructure consists of traditional bare-metal servers Servers can be secured with Intel TXT We need a mechanism to make the cloud TXT aware This mechanism exists today

Section 2 Technology

Intel Trusted Execution Technology (TXT) Prerequisites Intel TXT capable CPU/chipset (most Xeon, i5/i7) TPM hardware module TPM capable BIOS/UEFI Trusted boot module (tboot) Optional: Trusted Grub

How does Intel TXT work? Prerequisites Boot sequence (example: tboot / Linux) BIOS, attested by hardware, loads (trusted) bootloader Bootloader loads tboot, which wraps around kernel Tboot loads kernel, initrd On legacy platforms SINIT module may be required SINIT functionality is part of BIOS on modern platforms

Intel TXT Metrics Boot sequence (example: tboot / Linux) Platform Control Registers (PCR) Contain metrics of all stages of trusted boot /sys/devices/pnp0/00:0a/pcrs provides PCR values of running system PCR values used for local verification and remote attestation

What is Attestation? “Good” TXT boot metrics transferred to attestation server after system build or change to boot environment Attestation server retrieves actual state from clients TXT aware software requests trust states of available servers from attestation server Attestation server informs software of trusted or unknown state of attested servers

OpenStack Compute Resources How does Nova allocate resources? Nova schedulers FilterScheduler with TrustedFilter plugin TrustedFilter uses TXT attestation Nova flavors determine needed trust level (Trust_lvl) Instances with Trust_lvl=trusted only scheduled on trusted nodes

Attestation in OpenStack

Attestation server has known good state for all clients Attestation server polls actual state from all clients (1) Attestation server compares states and builds pool of trusted nodes TrustedFilter has cache of trusted nodes that gets updated periodically from attestation server TrustedFilter selects node from trusted pool for launch

TrustedFilter Under The Microscope

TrustedFilter under the microscope class TrustedFilter(filters.BaseHostFilter): Base class of the filter, instantiates ComputeAttestation. host_passes method returns true or false for a specific host. class ComputeAttestation(object): Instantiates ComputeAttestationCache. is_trusted method returns true or false for host. class ComputeAttestationCache(object): Local cache of attestation results. Invalidated on timeout. If cache not valid, _update_cache is executed. Cache is updated with AttestationService: class AttestationService(object): Pieces together request URL for attestation and requests data from Attestation Server via HTTPS

Section 3 Practical Application

Practical application: Attestation Server Attestation Server Can run on standalone server, VM, Controller Location depends on security requirements Needs: oat-appraiser package Firewall: Port 8443 traffic to all clients and OpenStack controllers Major dependencies: Apache2, Tomcat On RHEL/CentOS: EPEL repository required

Practical application: Trusted Host TPM installation: Packages trousers, tpm-tools TPM and Intel TXT must be enabled in BIOS tpm_takeownership -z to set credentials tboot installation: Use /boot/tboot.gz as wrapper, load kernel and initrd as modules for tboot.gz Modify grub to load tboot and load kernel and initrd from tboot as modules If BIOS does not include SINIT functionality, download and install SINIT from Intel

Practical application: Trusted Host cont’d OAT installation OAT_client.sh and provisioner.sh scripts Transfer keys from attestation server to clients Add necessary entries to the TPM (Certificate, OEM, OS, PCR values) Transfer known good state to attestation server

Practical application: Controller(s) Specify FilterScheduler and TrustedFilter /etc/nova/nova.conf … [DEFAULT] compute_scheduler_driver=nova.scheduler.filter_scheduler.FilterScheduler scheduler_available_filters=nova.scheduler.filters.all_filters scheduler_default_filters=AvailabilityZoneFilter,RamFilter,ComputeFilter,TrustedFilter …

Practical application: Controller(s) cont’d Configure TrustedFilter /etc/nova/nova.conf … [trusted_computing] server= port=8443 server_ca_file=/etc/nova/ api_url=/AttestationService/resources auth_blob= …

How to use OpenStack with TXT Operation: Modify flavors to require trust: $ nova flavor-key myflavor set trust:trusted_host trusted Build instances with trusted flavors Trusted instances will only be scheduled on trusted nodes

Summary Intel TXT protects infrastructure Attestation allows centralized verification Nova uses attestation to get trusted pool Nova flavors set up to define trust level Nova only schedules trusted workload on hosts from trusted pool

Questions? Recommended Reading: TXT: edora-oat-packages-installation edora-oat-packages-installation tboot: openstack: compute/admin/content/trusted-compute-pools.htmlhttp://docs.openstack.org/grizzly/openstack- compute/admin/content/trusted-compute-pools.html

Thank you. Christian Huebner | Cloud Architect